• 保护应用程序一任务无终结。

    The task of protecting your application is never done.

    youdao

  • 应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    Information gathered by social network applications needs to be protected by policies which control access to information.

    youdao

  • 完成这些配置步骤之后可以配置J2EE安全设施保护应用程序组件

    After these configuration steps are completed, you can configure J2EE security facilities to protect application components.

    youdao

  • 通过清理数据忽略被错误提交的数据,已经保护应用程序奠定良好的基础。

    By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.

    youdao

  • 毫无疑问,由于公共JVM,所以应用程序故障保护有限的。

    Of course, failure protection between applications is limited, due to the common JVM.

    youdao

  • 或许习惯于依赖传统应用程序保护数据

    Perhaps you're used to relying on the traditional application to protect your data.

    youdao

  • 这不影响应用程序访问保护

    This does not affect the application's ability to access the guard points.

    youdao

  • 启动WTE服务器然后尝试访问Web应用程序保护资源

    Start your WTE server and then try to access a protected resource in your Web application.

    youdao

  • xml保护应用程序安全性配置

    Security configuration protecting the application in web.xml.

    youdao

  • 了 OAuth一个资源所有者可以授权第三应用程序访问保护的资源,而不损害用户证书

    With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.

    youdao

  • 确保保护应用程序的内容没有在运行(例如Firefox或者Evolution)。

    Make sure that the application whose data you want to protect (e.g. Firefox or Evolution) is not running.

    youdao

  • 因此,要保护Web应用程序一步需要添加输入验证

    Therefore, input validation is the first step toward protecting Web applications.

    youdao

  • 安全保护Web应用程序资源机制

    A security realm is a mechanism to protect the Web application resources.

    youdao

  • 这种级别保护应用程序允许限制其他应用程序访问系统资源

    This level of protection lets the application allow or restrict other applications to access the system resource.

    youdao

  • 本文描述示例应用程序中,保护业务逻辑ejb使只有通过认证用户可以调用特定的EJB方法

    In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.

    youdao

  • 其余两个命令显示如何保护启动应用程序

    The remaining two commands simply show how to save and start the new application.

    youdao

  • 现在再次访问保护应用程序

    We will now access the secured application again.

    youdao

  • 所有存储库中的用户将用户和组映射J2EE应用程序中的保护资源

    Users and groups from all repositories are available for mapping users and groups to protected resources within the J2EE applications.

    youdao

  • 理论上可以相同方法保护MIDP应用程序

    In theory, MIDP applications could be secured by the same methods.

    youdao

  • 策略允许访问任何应用程序可以访问保护文件前提是应用程序使用系统访问文件。

    Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.

    youdao

  • 策略允许访问任何应用程序可以访问保护文件前提是应用程序使用系统访问文件。

    Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.

    youdao

  • 公共目录用于保护应用程序的。

    The corporate directory is used to secure the application.

    youdao

  • 约束角色部署安全保护应用程序确定

    Constraints and roles are fixed when a secured application is deployed.

    youdao

  • 应用程序是否将未经保护机密数据缓存放到本地机器上?

    Do your applications leave unsecured caches of confidential data on a local machine?

    youdao

  • DAO模式可以保护应用程序,使之不必与特定持久性方法捆绑在一起。

    The DAO pattern protects your application from being tied to a particular persistence approach.

    youdao

  • 应用程序文件默认保护的。

    Application files are protected by default.

    youdao

  • 即使不考虑通过由模型驱动开发基于SOA服务管理所提高的效率业务应用程序保护信息

    Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.

    youdao

  • 应用程序可以定义它们自己的定制权限保护应用程序资源

    Applications can define their own custom permissions to protect application resources.

    youdao

  • 我们建议应用程序重点放在业务逻辑延迟服务访问保护送往基础设施的消息(承载应用程序的运行时容器)上。

    We recommend that applications focus on business logic and defer securing the service access and the messages to the infrastructure (the runtime container hosting the application).

    youdao

  • 正如已经了解到的一样,Acegi组件彼此依赖,从而对应用程序进行保护

    As you have learned already, Acegi's components are dependent on each other to secure your applications.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定