审计网络访问控制和安全远程访问系统。
Audit network access control and secure remote access systems.
这种组合方式创建了一种安全的网络访问控制方式。
The combination creates an integrated online access-control and security solution.
还有用于套接字、网络接口、主机和端口的网络访问控制。
There are also network access controls for sockets, network interfaces, hosts, and ports.
本文提出了一种基于RBAC策略的多域网络访问控制模型。
In this paper, we propose a multi-domain RBAC access control model.
身份认证与网络访问控制验证用户的合法身份,授权网络资源的访问。
Authentication and network access control system verifies users legal identity and authorizes network resources access.
分析过量规则对网络访问控制设备性能的影响,讨论针对这一问题的解决方法。
After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
海德里希现在经常访问那些讨论游戏成瘾的网站,“以此提醒自己要控制对网络游戏的热爱”。
Heidrich now visits websites that discuss gaming addiction regularly "to remind myself to keep my love for online games in check".
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
他们的责任是控制用户对网络的访问。
They are responsible for the control of user access to the network.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
访问控制可以外化给网络代理,不用再在本地应用里执行。
Access control can be externalized to a network proxy instead of being performed within the local app.
把磁盘映射到两个VIO服务器并创建网络控制通道,VIO客户机LPAR就会有两个访问路径。
Mapping disks to both VIO servers and creating network control channels gives VIO client LPARs two legs to stand on.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
For example, you need to control access to EJBs using a network-safe encrypted token.
这是与之前的LotusSametime功能的基本差异,而且它通过对公共和其他公司IM网络的策略管理访问,提供了更大的管理控制。
This is a fundamental difference from prior Lotus Sametime functionality and provides much greater administrative control through policy-managed access to public and other company IM networks.
例如,它难以正确使用,root用户还是可以从中脱离,而且它根本不去控制网络访问。
For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
剩余的策略主要是授与容器充分的特权,以访问系统的各个部分:网络端口、设备和控制台等。
Most of the rest of the policy merely is there to grant the container sufficient privilege to access bits of the system: network ports, devices, consoles, etc.
Subversion是一种开放源码的全新版本控制系统,支持可在本地访问或通过网络访问的数据库和文件系统存储库。
Subversion is a new open source, version control system that supports database and file-system repositories that can be accessed locally or over the network.
机架间的连接图(用于网络、电源、控制台访问等等)。
Inter-rack connection diagrams for network, power, console access, and so on.
使用云中的一个BuildForge控制台来运行您自己的网络中的代理系统上的作业,以便代理系统能够访问您的ClearCase或ClearQuest系统。
Using a Build Forge console in the cloud to run jobs on agent systems in your own network so that the agent systems can access your ClearCase or ClearQuest systems.
例如,如果您最信任的系统在一个专用的隔离的网络上运行,那么使用telnet在这个网络区中进行远程访问(或从控制台工作)是非常合适的。
For example, if your most trusted systems run on a dedicated and segregated network, it makes perfect sense to use Telnet for remote access within that very network zone (or working from the console).
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
文档库在Windows资源管理器中作为网络位置显示,可让您方便地访问诸如锁定、版本控制和编辑等文档管理功能。
Document libraries appear as network places in the Windows Explorer, giving you easy access to document management functions such as locking, versioning, and editing.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
虚拟热点上的数据访问可以通过不同的APN(网络的数据路由访问点)进行路由,并且可以通过主iphone的数据计划控制设备的网络访问速度。
Data access over the virtual hotspot may be routed through a different APN (the data routing access point for the network) and charged under different rates to the main iPhone data plan.
通过对互联网访问控制设备AR 2000的过滤性能的分析测试,研究其对网络效率和流量的影响。
By the analysis and test of the filter performance of the Internet access control Equitment AR2000, we research how it influence the efficiency and flux of the network.
它为网络访问提供了第一层访问控制。
It provides the first layer access control for network access.
应用推荐