While connection security is important, there are not a lot of decisions to be made about it.
尽管连接安全很重要,但对于它没有太多决策需要制定。
Connection security is a simple binary setting: either a user can connect to the queue manager, or they cannot.
连接安全性是一个简单的二元设置:用户要么可以连接队列管理器,要么不能。
Security Settings for the directory server connection.
目录服务器连接的安全设置。
A setting like this, which exempts a connection from security, should be used with great caution, or not at all.
这样的设置—免除连接的安全性—使用时要非常小心,或者根本不要使用。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (Figure 1).
这些系统契约定义资源适配器为事务管理、连接管理和安全提供的服务质量(图1)。
The connection can still be used, just with heightened security in mind.
连接仍然可用,只是需要从思想上提高安全意识。
For performance reasons, antivirus software is best avoided — which means that for security reasons, you can't allow a network connection to the machine.
出于性能考虑,最好避免使用反病毒软件——这就意味着为了安全起见,不能将该机器连接到网络。
The specification also defines a set of system-level contracts between the J2EE application server and the RAs for connection, transaction, and security management.
该规范也在J2EE应用程序服务器及RA之间定义了一套系统级的合同,用于连接、事务处理及安全管理。
This allows the resource adapter and application server to share resources and provide services such as security, connection pooling, and transaction management.
这使得资源适配器及应用程序服务器共享资源并提供例如安全、连接池及事务处理这样的服务。
These data could be consulted by browsers or third-party plugins to sniff out unusual changes in security documents and warn users—or simply prevent a connection.
这些数据可以通过浏览器或第三方插件进行咨询来嗅出安全文件里不一般的变化并警告用户---或完全地阻止连接。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (see Figure 1).
这些系统契约定义了资源适配器为事务管理、连接管理及安全提供的服务的质量(参见图1)。
Security is implemented through a database deployment plan that specifies the database driver, connection URL, and SQL, among other data.
安全性通过数据库部署计划实现,这个计划在其他数据库中指定数据库驱动程序、连接URL、SQL。
This will not scale well as long as security is managed at the connection and queue level.
只要安全性在连接和队列级别上管理,就不能很好地伸缩。
The EJB container relieves developers from managing common enterprise functions such as security, transaction handling, connection pooling, and external resource management.
ejb容器使开发人员不必管理常见的企业功能,如安全性、事务处理、连接合用和外部资源管理。
Whether or not the connection should be used is dependent upon the verification result and security considerations.
是否应该使用连接取决于验证结果和安全方面的考虑。
Under managed mode, the application server interfaces with resource adapters to manage quality of service features such as connection pooling, transaction management, tracing, and security.
在受管模式下,应用程序服务器与资源适配器建立接口,从而管理诸如连接池、事务管理、跟踪和安全性之类的服务质量特性。
Losing the connection with a loved one, however, jeopardizes our sense of security.
失去你和你爱的人的联系,在某种程度上危害了我们的安全感。
To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.
为了避免对安全漏洞的攻击,使用这些受信任方法的应用服务器不应该使用不受信任的连接方法。
It's a lightweight tool that centralizes management of database connection pooling, accounting, and security.
这是一款轻量级工具,能够集中化对数据库连接池、财务和安全性的管理。
These Settings can include JMS connection factories and destinations, JDBC data sources, J2EE security Settings, mail sessions, and so on.
这些设置可以是JMS连接工厂和目的地、jdbc数据源、J2EE安全设置、邮件会话等等。
But when I mention the connection to security, suddenly things like solar power start looking a lot better.
提到与安全的联系时,像太阳能这样的事情突然就看起来好多了。
It assumes a basic knowledge of both CICS and the JCA, and is not designed to cover other decision factors, such as connection management or security.
本文假设读者具有CICS和JCA的基础知识,并且没有考虑其它决策因素,如连接管理或安全。
Typically, in GSS-API a secure connection between two communicating applications is represented by a data structure called a security context.
在GSS - API中,两个相互通信的应用程序之间的安全连接通常由一个称为安全上下文的数据结构表示。
The code might have implemented its own threading, caching, connection pooling, or even (heaven forbid) security infrastructure.
该代码可能实现了自己的线程、缓存、连接池甚至(但愿不会如此)安全基础设施。
Then specify the properties of deployment, security, connection, and so on, according to the setting of your deployment and runtime environment, similar to Figure 11.
然后,根据部署和运行时环境的设置,指定部署、安全、连接等的属性,见图11。
SEC_CIRCUIT_AUTH — Use SSL security for privacy and integrity protection only on the initial request (while establishing the connection).
SEC_CIRCUIT_AUTH——仅在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护。
Access of CONTROL or ALTER, on the other hand, means that there is no MQI security for that connection.
另一方面,CONTROL或ALTER访问意味着那个连接没有MQI安全性。
For example, if you wanted to use a running instance as a Web server, you would define a rule in your security group that connection requests on port 80 should be accepted from any machine.
例如,如果您想使用一个运行的实例作为一个Web服务器,那么您应该在您的安全组中定义一个规则:任何机器对端口80的连接请求都应该被接受。
For AIX, the secldapclntd daemon manages the connection between an ldap server and the internal AIX security ldap module.
对于AIX, secldapclntd后台程序管理着一个ldap服务器与内部AIX安全ldap模块之间的连接。
For AIX, the secldapclntd daemon manages the connection between an ldap server and the internal AIX security ldap module.
对于AIX, secldapclntd后台程序管理着一个ldap服务器与内部AIX安全ldap模块之间的连接。
应用推荐