非授权访问,实施攻击的技术包括目录攻击和伪造消息。
Unauthorized access using techniques such as dictionary attack and falsified message.
员工们需要采取一切必要的措施阻止对于这些信息的非授权访问。
Employees should take all necessary steps to prevent unauthorized access to this information.
大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。
Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.
对特定页面的访问使用J2EE声明性和程序性安全来限制,以禁止对页面的非授权访问。
Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.
中国电信也不会对任何由于你的原因导致的经因特网的任何非授权访问所造成的损失或破坏负责。
China Telecom will not be liable for any loss or damage suffered by you as a result of any unauthorised access to your account over the Internet.
该机制可有效地阻止对EPCIS系统和资源的非授权访问,从而确保对EPCIS访问的安全性。
The mechanism can guarantee safe access to EPCIS system by preventing the unauthorized access to EPCIS system or resources.
我们感谢您的信任,并采取合理的步骤保护您在线提供的个人信息,防止其丢失,滥用和非授权访问。
We acknowledge your trust and are committed to take reasonable steps to protect Personally Identifiable Information you provide online from loss, misuse, and unauthorized access.
可以配置WebspherePortal来通过使用LDAP目录进行身份验证,从而避免非授权访问。
You configure Websphere Portal to avoid unauthorized access by using an LDAP directory for authentication.
您可以使用另一个未经授权处理任务的用户身份登录,以确保不管是否应该在To -do列表中显示任务,非授权访问都可以正常运行。
You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user's To-Do list.
您已经学习了如何在ApacheGeronimo应用服务器上创建并且部署应用程序,保护目录内容不受非授权的访问。
You've learned how to create and deploy an application on the Apache Geronimo application server, securing directory content from unauthorized access.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
应用推荐