这是避免拟人化的安全策略。
使用这种包时可以采用的安全策略包括。
Strategies for preserving security when using this package include.
好的安全策略是什么样子的呢?
某些系统的安全策略可能不允许向其他用户泄露密码。
Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users.
对于源表及目标表采用相同的安全策略进行保护。
Both source and target tables are protected by the same security policy.
它还可以用来检验新的或修改的安全策略的效果。
It can also be used to verify the effect of a new or changed security policy.
在使用服务之前,最终用户应该评估服务提供商的安全策略。
An end user should evaluate a service provider's security policy before entering into a relationship.
通过适当的、良好定义的安全策略可以阻止增加的风险。
This increased risk can only be prevented with proper, well-defined security.
这里的表格列示了安全组default 的安全策略。
The table here lists the security policies for the security group default.
EJB技术可以在任何EJ b组件或方法上实施方法级的安全策略。
However, EJB technology allows method-level security on any EJB component or method.
一些人认为对于普通用户账户使用随机密码是良好的安全策略。
Some people suggest using random passwords for ordinary user accounts is good security policy.
一个表中的数据只能受到保护该表的安全策略的安全标签的保护。
Data in a table can only be protected by security labels that are part of the security policy protecting the table.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Next, measure the level of business risk associated with your assets according to your security policies.
它还存储了单元的整体信息,比如单元范围的安全策略、票证有效期等。
It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.
为了就适用于参加协作工作的企业的安全策略、标准和工具达成一致意见。
To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts.
将创建请求和响应处理规则来按照要求操作SOAP消息,以遵循所需的安全策略。
Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.
SOA编程模型必须确保每个服务调用都符合对请求者和服务端点均有效的安全策略。
An SOA programming model must ensure that each service invocation adheres to security policies that are valid for both the requester and service endpoint.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
而在连接断开之前显示给不必要的调用者的消息将会下降到您自己的安全策略级别以下。
The message displayed to the unwanted caller before the connection is broken will be down to your own security policy. However, one could have a message as shown below
有时候,系统管理员希望实施不同的安全策略,这时就可能需要修改或替换身份验证方法。
At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.
请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。
Note that this is an example; you or your security policy might dictate additional parameters than are being used here.
答案是,这些应用还是在.NET沙箱中运行,所以跟在浏览器中一样,遵守同样的安全策略。
The response is that these applications still run inside a .NET sandbox and are subject to the same security policies that apply when running in the browser.
在线协作漏洞的范围取决于项目复杂程度、与相似项目的相互关系以及是否存在合适的安全策略。
The range of online collaboration vulnerabilities depends on project complexity, interrelationships with similar projects, and whether the security policies are in place.
实际上,证书类型的选择应该基于理想的安全策略和企业是否准备好建立和维护一个证书撤销列表。
The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.
那就有了困难:为了使SELinux有效,您需要有一个好的安全策略来由SELinux执行。
And there's the rub: to use SELinux effectively, you need to have a good security policy for SELinux to enforce.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
例如,如果服务提供者的安全策略声明要求使用加密消息,则ESB可以自动配置一个encryption中介。
For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
应用推荐