As Apple and several security experts have argued, an order compelling Apple to write software that gives the FBI access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的,强迫苹果公司编写软件来让联邦调查局访问某 iPhone的指令,将树立起一个令人不安的先例。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the F.B.I. access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的那样,强迫苹果公司编写软件来让联邦调查局访问某iPhone 的指令,将树立起一个令人不安的先例。
There will be several different security domains, each of which have different access controls and restrictions.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
If you have global security enabled, no users will be able to access any inbound service.
如果您启用了全局安全性,那么没有用户可以访问任何的入站服务。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
However, there are situations when the standard file access does have limitations; this can arise with application access or security related products.
但是,在某些情况下,标准的文件权限有局限性;与应用程序访问或安全性相关的产品可能会出现这种情况。
The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.
缺乏数据库级别的安全模型使得充分利用ZEO存储服务器变得非常困难,因为客户端或多或少地拥有对数据库的自由访问,因此客户端必须受信任。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Everyone will see exactly the same breakdown structure, as long as they have the required security access.
每一个成员都会准确的看到相同的分类结构,只要他们拥有必要的安全访问权限。
A hard-linked file does not require the user to have access rights to the original file and does not show the location of the original, so it has some security advantages.
硬链接的文件不需要用户有访问原始文件的权限,也不会显示原始文件的位置,这样有助于文件的安全。
What users have a hard time reconciling however is the security and privacy implications (real imagined or potential) that come with allowing third parties access to this information.
然而,用户难以调控的是,第三方一旦获得这些数据后所带来的安全及隐私上的影响(真实的,想象的或潜在的)。
What users have a hard time reconciling, however, is the security and privacy implications (real, imagined or potential) that come with allowing third parties access to this information.
然而,用户难以调控的是,第三方一旦获得这些数据后所带来的安全及隐私上的影响(真实的,想象的或潜在的)。
At many of the security assessments I have performed, I have had to report to the company that they were allowing anonymous administrative access to their messaging system through unsecured channels.
我进行过很多安全评估,我必须向公司报告他们允许通过不安全通道对其消息传递系统进行匿名管理访问。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
LBAC controls access to table objects by attaching security labels to them. Users attempting to access an object must have its security label granted to them.
LBAC通过为表对象添加安全标签来控制对它的访问。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.
因此,每一个类或者对象“属于”一个ProtectionDomain,安全策略对这个保护域授予了某种访问权限。
Next we'll define the security roles for security roles are named sets of users that will have access to secure resources (like a servlet, JSP, EJB or SCA component) and methods.
接下来,我们将定义安全角色。安全角色是具有安全资源(如servlet、JSP、EJB或SCA组件)及方法的访问权限的命名用户集。
You can simply use put/get methods to have access to the security attributes.
您可以使用put/get方法来访问这些安全属性。
This message indicates that the bus security is enabled and WBEruntimeear is unable to access the SIBus because it does not have authority to access it.
这个消息表明,总线安全性已经启用,但是WBEruntimeear没有访问SIBus的权力,因此无法访问它。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
Each user should have access to a security level based upon the level of data sensitivity he or she can see.
根据用户可以看到的数据的敏感性级别,每个用户都应该可以访问某个安全级别。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
Users attempting to access an object must have its security label granted to them.
试图访问一个对象的用户必须被授予此对象的安全标签。
Multiple security groups actually have read access to some or all properties.
有几个安全组确实有权访问一些甚至全部的属性。
You can provide granular security and access control so that different roles and teams only have influence on areas that are deemed acceptable.
您可以提供渐进式安全和存取控管,这样不同的角色和小组只对认为可接受的区域产生影响。
Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.
第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。
Fewer and fewer of your citizens have access to affordable housing, healthcare or security in retirement.
能够负担得起住房,医疗保健或退休生活保障的公民越来越少。
应用推荐