保护您的应用程序这一任务永无终结。
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
完成这些配置步骤之后,可以配置J2EE安全设施来保护应用程序组件。
After these configuration steps are completed, you can configure J2EE security facilities to protect application components.
通过清理数据并忽略被错误提交的数据,已经为保护应用程序奠定了良好的基础。
By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.
毫无疑问,由于是公共的JVM,所以应用程序间的故障保护是有限的。
Of course, failure protection between applications is limited, due to the common JVM.
或许您习惯于依赖传统应用程序来保护数据。
Perhaps you're used to relying on the traditional application to protect your data.
这不影响应用程序访问保护点。
This does not affect the application's ability to access the guard points.
启动WTE服务器然后尝试访问Web应用程序中被保护的资源。
Start your WTE server and then try to access a protected resource in your Web application.
xml中保护应用程序的安全性配置。
Security configuration protecting the application in web.xml.
有了 OAuth,一个资源所有者可以授权第三方应用程序访问受保护的资源,而不损害用户证书。
With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.
确保你要保护的应用程序的内容没有在运行(例如Firefox或者Evolution)。
Make sure that the application whose data you want to protect (e.g. Firefox or Evolution) is not running.
因此,要保护Web应用程序,第一步需要添加输入验证。
Therefore, input validation is the first step toward protecting Web applications.
安全域是保护Web应用程序资源的机制。
A security realm is a mechanism to protect the Web application resources.
这种级别的保护让应用程序允许或限制其他应用程序访问系统资源。
This level of protection lets the application allow or restrict other applications to access the system resource.
在本文描述的示例应用程序中,保护业务逻辑ejb,以使只有通过认证的用户可以调用特定的EJB方法。
In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.
其余的两个命令仅显示如何保护和启动新应用程序。
The remaining two commands simply show how to save and start the new application.
现在再次访问受保护的应用程序。
所有存储库中的用户和组均可将用户和组映射到J2EE应用程序中的受保护资源。
Users and groups from all repositories are available for mapping users and groups to protected resources within the J2EE applications.
理论上,也可以用相同的方法保护MIDP应用程序。
In theory, MIDP applications could be secured by the same methods.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.
公共目录是用于保护应用程序的。
约束和角色在部署受安全保护的应用程序时确定。
Constraints and roles are fixed when a secured application is deployed.
您的应用程序是否将未经保护的机密数据缓存放到本地机器上?
Do your applications leave unsecured caches of confidential data on a local machine?
DAO模式可以保护应用程序,使之不必与特定持久性方法捆绑在一起。
The DAO pattern protects your application from being tied to a particular persistence approach.
应用程序文件默认是受保护的。
即使不考虑通过由模型驱动的开发和基于SOA的服务管理所提高的效率,业务应用程序仍须保护信息。
Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.
应用程序可以定义它们自己的定制权限,以保护应用程序资源。
Applications can define their own custom permissions to protect application resources.
我们建议将应用程序的重点放在业务逻辑、延迟服务访问的保护和送往基础设施的消息(承载应用程序的运行时容器)上。
We recommend that applications focus on business logic and defer securing the service access and the messages to the infrastructure (the runtime container hosting the application).
正如您已经了解到的一样,Acegi的组件彼此依赖,从而对您的应用程序进行保护。
As you have learned already, Acegi's components are dependent on each other to secure your applications.
应用推荐