网络数据库的安全性越来越得到重视。
The security of net database has received more and more attention.
数据库加密能够显著提升数据库的安全性。
Database encryption can significantly enhance the security of the database.
数据库的安全性是设计数据库应用系统的一个重要环节。
Safety of database is an important part in designing database application system.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
数据库的安全性是指保护数据库以防止不合法的使用所造成的数据泄露、更改或破坏。
The security of databases is to protect databases to avoid the leaking, changing and breaking of data after illegal uses.
在整个系统设计过程中,充分考虑了数据库的安全性、一致性、稳定性和可靠性的问题。
Throughout the system design process, full consideration has been given to database security, consistency, stability and reliability issues.
数据库的安全性是系统设计的首要问题,论文介绍了为保证数据安全提出的思路和解决方案。
Because the safety of database is the chief problem of system design, paper has introduced the solution and scheme that made for guaranteeing data safety.
通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制的性能,从而提高数据库的安全性。
Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.
现在我们已经确保了操作系统和服务器的安全性,接下来将讨论如何确保Domino服务器上数据库的安全性。
Now that we have secured the operating system and the server, we can talk about securing the databases on the Domino server.
EDB系统还承担着数据库的维护工作,保证数据库的安全性和完整性,对数据库频繁操作积累起来的碎片进行整理。
EDB could service database and this function ensures database's safeness and integrity. It also could collate fragment that generates from frequency operation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
提出了设计用户权限级别模块的方法来管理数据库的安全性,不仅可以为不同级别的用户规定不同的权限,还可以在整个系统上统一管理用户的权限。
A module of managing users' grants is approach to realize the safety of database. With this method, users' grants can be managed over whole distributed system.
例如,可能会支持按某些条件(如“支持的数据库条目数量”或“安全性级别”等)发现服务。
For example, discovering services by criteria such as "number of supported database entries" or "security level" could be supported.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
这些包括更改邮件数据库的拥有者、更改密码、设置用户安全性、定制复制设置等。
These include changing the owner of a mail database, changing passwords, setting up user security, customizing replication Settings, and so on.
本文阐述了将定制的安全性插件部署到DB 2系统前,插件编写人员或数据库管理人员应该测试的内容。
This article explains what the plug-in writer or database administrator should test before deploying the customized security plug-ins to the DB2 system.
其中许多安全性方面对于数据库管理员是已知的。
Many of these security aspects are known to a database administrator.
在典型的IT组织中还包括多个其他角色,包括基础设施支持、数据库支持、安全性等等。
There are several more roles in a typical it organization, including infrastructure support, database support, security, and so on.
可以配置数据源使用集成的安全性,以便可以使用当前的用户帐户进行数据库连接。
Data sources can be configured to use integrated security so that database connections are made using the current user's account.
这是一款轻量级工具,能够集中化对数据库连接池、财务和安全性的管理。
It's a lightweight tool that centralizes management of database connection pooling, accounting, and security.
对于前者要求建立起数据一致性,数据完整性强,数据安全性高和具有较强容错能力的数据库。
For the former, it requires to build a database which holds strong data consistency and integrality and high data safety, and has strong ability of permitting the mistakes.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
为这个安全性插件创建的所有数据库对象都放在db2auth模式中。
All the database objects that are created for the security plug-in are encapsulated within a DB2AUTH schema.
客户机系统通过服务器系统连接到数据库时的安全性考虑。
Security considerations when connecting to a database from a client system to a server system.
连接到数据库之后执行sql语句时的安全性考虑。
Security considerations when performing SQL statements after connecting to the database.
o指定只验证安装文件;不会执行实例、数据库和扩展安全性的验证。
O Specifies that only the installation files will be validated; validation of the instance, database, and extended security will not be performed.
如果Tomcat仅用该数据库来获得容器管理的安全性,那么这就是最简单的解决方案。
This is the simplest solution if the database is used exclusively by Tomcat for container managed security.
如果Tomcat 仅用该数据库来获得容器管理的安全性,那么这就是最简单的解决方案。
This is the simplest solution if the database is used exclusively by Tomcat for container-managed security.
当以Web服务的方式访问数据库时,安全性总是一个值得关注的问题。
Security is always a concern when you enable Web services access to your database by means of Web services.
当以Web服务的方式访问数据库时,安全性总是一个值得关注的问题。
Security is always a concern when you enable Web services access to your database by means of Web services.
应用推荐