Kevin B. Kealy is a chief information security officer for FIS.
凯文·基利是FIS的首席信息安全官。
The presumption is that you can make security decisions based on the information in these tokens.
这种方法假设您可以根据这些令牌中的信息做出安全性决策。
Of course, it is essential that the firm can guarantee the security of personal information and credit card numbers.
当然,最重要的是该公司必须保证能对消费者的个人资料和信用卡号码保密。
The success of our global effort to maintain and increase security depends on reliable information that is available and clear to all who need it.
我们维持和加强安全的全球努力的成功取决于是否能向所有有需要的人提供可靠和明确的信息。
Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,当考虑到信息安全问题时,可以控制对信息的访问。
Security management process is needed to maintain the integrity of information and protect it assets.
需要安全性管理过程来维护信息的完整性并保护IT资产。
This is the mechanism the container USES to pass security policy information to the provider.
这是容器用于将安全策略信息传递给提供程序的机制。
More information about high availability and security issues is available in the resources section.
有关高可用性和安全问题的更多信息,请参阅“参考资料”部分。
This information is used to help identify potential security "holes" that may be weak points for attacks against customers.
这些信息用于帮助发现潜在的安全“漏洞”,此类弱点可能被利用向客户发起攻击。
It is the responsibility of the security advisor and the architect to make sure that this information is not logged without masking.
安全顾问和设计师有责任要确保这些信息不会未加任何处理就保存到日志中。
If you are responsible for domain security you need to know what information it is possible to see by default.
如果你负责域安全的话,你必须知道什么信息在默认时就是可见的。
Authentication is a process to verify a person's identity for security purposes and authentication factor is the piece of information used to achieve it.
身份验证是出于安全目的检查人员身份的过程,而身份验证因素是用来实现身份验证的信息。
Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,在考虑到信息安全性时,可以对访问进行控制。
Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.
基于角色的安全性是保护企业信息资产的一个不错的方法,而且它可能比您想象的更容易实现。
When transferring a job from the job manager to the administrative agent or the deployment manager, security information about the job submitter is also transferred.
将作业从作业管理器传输到管理代理或部署管理器时,也会传输关于作业提交者的安全信息。
Security is a broad topic that includes authentication, authorization, and information transmission.
安全是一个涉及面很广的话题,如认证、授权及信息传输等。
The LDAP database is loaded with the user and group information from the localhost's security database files.
使用本地主机的安全数据库文件中的用户和组信息装载ldap数据库。
When configured in medium security mode, the dynamic routing information is obtained and used by the secure proxy server.
当配置为中级安全模式,安全代理服务器将获得并使用动态路由信息。
It is their difficulty to grasp that makes primes the basis for our modern information security.
正因为他们非常难把握,质数成为我们现代信息安全的基础。
Keystore is a key repository that contains EFS security information.
密钥存储库是包含EFS安全信息的密钥库。
Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.
DIFC这种安全手段,让应用程序的作者能够控制应用的组成部分与外部世界之间数据如何流动。
Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.
现在,我们可以提取日常审计报告需要的信息,只提取与自己的审计安全策略有关的信息。
This ensures the security of the information being transferred and accessed is also left to the user to enforce in their application logic.
用户还需对其应用程序逻辑进行增强,以确保被传递和访问的信息的安全性。
When securing digital information, it is important to implement end-to-end security.
在保护数字信息时,实现全程安全性是很重要的。
SIF creates a security context object, which is a placeholder for security-related information.
SIF创建了一个安全上下文对象,这是一个与安全相关的信息的占位符。
It is very simple to use and requires minimal coding to propagate custom security information between servers.
它非常易于使用,并且只需要进行很少的编码就可以在服务器之间传播自定义的安全信息。
In part 2 of this series, DB2 security plug-ins were introduced, as well as the method in which DB2 security is implemented, and a list of relevant detailed information about security plug-ins.
本系列的第2部分介绍了DB 2安全性插件、实现DB 2安全性的方法及一系列与安全性插件相关的详细信息。
On the other hand, if the application is relying on additional information in the HTTP headers for security purposes, you should use mutual SSL authentication.
相反,如果应用程序依靠HTTP消息头中额外信息保证安全,您应该采用相互ssl认证。
One key aspect is security, which includes digital information security.
法规遵从性的一个关键方面是安全性,包括数字信息安全。
It is not at all uncommon for these security tokens to have no cryptographically verifiable information.
这些安全性令牌一般没有密码验证信息。
应用推荐