Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Develop policies and procedures that tell you what to do before, during and after a breach of data security.
制定公司政策及过程,以告诉您平时应该做什么,发现数据安全问题时又应该做什么。
Policies can also force strong passwords and set security features such as the number of times a password attempt can fail before the device wipes its data.
这方面的政策还可以要求设定复杂的密码以及设置安全功能,如在多次密码输入错误后可自动抹除设备上的数据。
Work is now going on in the SAE to automate the end-user feedback collection and support a level of community moderation compliant with enterprise data governance and security policies.
SAE中的相关工作现在正在进行,以自动化的形式收集最终用户反馈和支持某种遵从企业数据治理和安全策略的修改级别。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
ALL security policies defined with RFIDIC have ALLOW semantics, meaning, the policies define what data can be disclosed.
RFIDIC定义的所有安全策略都具有allow语义,这意味着策略定义哪些数据是可以公开的。
These security policies are defined using the master data in the system. The policies require no customer development.
使用系统中的元数据定义这些安全策略,客户不需要开发它们。
In order to show the effects of data disclosure control by defining and enabling security policies, you need to send a few sample events to RFIDIC by using its capture interface for message queues.
为了显示定义并启用安全策略所产生的数据公开控制的效果,需要使用RFIDIC的捕捉接口向RFIDIC发送一些示例事件。
Like Facebook today, it was criticized for its policies on privacy, security and willingness to sell user data, as well as its use of its own proprietary tools.
就像今天的Facebook,美国在线在隐私政策、安全、出售用户数据和使用自有专门工具等方面备受指责。
Administrator: Users in this role can run any query in the Data Browser, create security policies, and browse and resubmit failed events.
Administrator:属于这个角色的用户可以在DataBrowser中运行任何查询、创建安全策略以及浏览和重新提交失败的事件。
Security: This is the entry point for applications to access heterogeneous data sources based on who-can-see-what policies.
安全性(Security):这是应用程序访问基于 who-can-see-what 策略的不同种类数据源的入口点。
Security professionals need to be able to apply security policies to applications, data, and users wherever they are, and those policies need to adapt based on the changing context.
无论应用、数据和用户身处何方,安全专业人士都必须能够充分利用安全政策,这些政策必须根据不断变化的环境来适应新的条件。
Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.
对人员、用户帐号、系统策略、数据保护、病毒防治制定了详细的安全措施。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
WCF Data Servicess do not implement security policies but instead provide the infrastructure required for service developers to write their own security rules and business validation.
WCF数据服务未实现安全策略,而是提供了必需的基础结构,以便服务开发人员编写自己的安全规则和业务验证。
These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.
进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制。
These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.
进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制。
应用推荐