因此,对移动计算安全性的研究具有重要的意义。
Therefore, research on the security of mobile computing has important significance.
关于云计算安全性的讨论往往失于对一般问题和云计算特定问题未加区分。
Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues.
从分析移动计算环境下计算安全性的基本问题入手,探讨了基于程序语言的安全技术和实现方法。
By analyzing the main problems of computation security under mobile computation environment, the language-based security technology and implementation method are illustrated.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
A Content Audit option that determines whether security policy calculation should be done in FM.
安全性是云计算的另一个重要方面。
云计算的问题显而易见—其中最重要的两个问题是保密性和安全性。
The issues of cloud computing are clear-with privacy and security being two of the most important.
当然,如果云计算要想达到最佳的安全性和一般运营标准,就必须有全球协作。
Of course, there must be global cooperation if the cloud computing process is to attain optimal security and general operational standards.
如果使用云中的系统,在数据安全性和连接性方面会有风险,恶意活动也可能会妨碍计算过程。
With the use of systems in the cloud, there is the ever present risk of data security, connectivity, and malicious actions interfering with the computing processes.
由于MAC的计算要比数字签名快,因此它对于诸如ssl等数据传输量很大的传输层安全性来说是实用的。
Because a MAC can be computed faster than a digital signature, it is practical for transport layer security like SSL, where a large volume of data is transmitted.
定制无线安全性非常困难,尤其是对于手持设备上有限的计算能力。
Customizing wireless security is extremely difficult, especially given the limited computing power on handheld devices.
此类用来提升云计算技术安全性的技术正在开发中。
Such technologies are being developed to improve the safety of cloud-based computing.
因此,安全性和私密性是所有云计算提供商优先考虑的问题。
So security and privacy are high priorities for all cloud computing entities.
如果你正担心开源中的隐私性及安全性,那么在云计算中也得考虑这些。
If you thing privacy and security come with open source, you'll find what you need in the cloud.
其他地理学方面的研究也需要类似的计算能力,例如用来预测地震的系统,用于安全性工作的多谱段卫星成像系统。
Other geological efforts require similar computing power, such as designing systems to predict earthquakes and designing multispectral satellite imaging systems for security work.
我们之所以把它们包括在架构之中,是因为我们希望提供一个全景——要完整描述IT安全性就必须也照顾到云服务的非特定于云计算的组成部分。
We include them in the architecture because we want to provide the complete picture; a full treatment of it security must account for a cloud service's non-cloud-specific components.
正在转向云计算的组织最关心的问题是安全性和私密性。
The main concerns voiced by those moving to the cloud are security and privacy.
他还指出云计算的安全性已经被广泛认可,而且要求颇高。
He says the safety of cloud computing has yet to be proven and likely requires work to reach acceptable levels.
最后介绍测试SaaS在云计算中的执行情况所需的条件,以及SaaS在安全性方面的问题。
Finally, I'll look at what criteria you need to test how well SaaS is performing in cloud computing and some security issues with SaaS.
既然现在这些工具可由各种规模的企业—从全球企业到便携式计算机上的一个基于WebSphereMQ客户机的应用程序—访问,安全性模型就能适应架构变化的要求。
Now that those tools are accessible to every size shop — from global enterprises to a WebSphere MQ client-based application on a laptop — the security model can catch up to the architecture.
例如,实现人员可以从每个请求中的安全性上下文里检索请求者的用户ID,使用它来确定目标计算器总数。
For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.
此场景经常用于所有组件都是内部组件、使用相同的安全性管理且属于受信任计算机群的情况。
This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.
网络防御的另外一个重要的方面是提高计算机自身的安全性。
Another important component of cyber defense is to improve security on the computers themselves.
飞机失事没有碰撞的两千个黑盒子参数将通过计算机分析获得,将进一步提升航空线的安全性。
Two thousand black box parameters from planes that do not crash can be harvested via computer analysis to further increase airline safety.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
通过利用UNIX处理文件系统和卷的方法可以提高计算机的安全性和性能。
UNIX's method of handling file systems and volumes provides you with an opportunity to improve your computers' security and performance.
增强计算机安全性的最后一种方案是最激进的:关闭打开的端口,这会让任何攻击都无法攻破您的计算机。
The last scheme for adding security to your machine is the boldest one. You will close the open port making your machine virtually impregnable to any attack.
不过,您也应该花一些时间来确保其他计算机(包括您的桌面系统)也具有合理的安全性。
However, you should also spend some time ensuring that other computers, including your desktop systems, are reasonably secure.
从示例到实现,这里提供的对gdm的修改使您可以增强计算机的安全性。
Moving beyond examples and into implementation, the modifications to GDM presented here allow you to enhance the security of your computer.
这些修改不会显著增强计算机的安全性,但是只尝试强力攻击标准端口22的一般脚本会失败,不会造成损害。
These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.
这些修改不会显著增强计算机的安全性,但是只尝试强力攻击标准端口22的一般脚本会失败,不会造成损害。
These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.
应用推荐