A new selection method of security factor was raised.
并在此基础上提出了安全系数选择的新方法。
Based on the active defense model of the network data transmission, a method of security measurement of the network data transmission is proposed.
基于网络数据传输过程中的主动防御模型,提出了一种对网络数据传输过程中的安全性进行测量、量化和评估的方法。
Another aspect of Security Management that can now be visually created and manipulated is Method Permission.
用户能够直观地创建和操作安全性管理的另一个方面是方法许可。
It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.
总的说来,这是一种非常粗粒度的安全形式,用于处理对系统的功能领域的访问,可以由url或对EJB组件的方法调用进行定义。
To improve security, it's often wise to use more than one method of protection (also called "defense in depth").
要提高安全性,明智的做法是使用多种保护方法(也称为“深度防御”)。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
Vendors choosing this method of kernel adaptation will therefore be held responsible for maintaining their own packages for the lifetime of their product, with respect to both bugs and security fixes.
供应商选择这种方法将因此内核适应追究维持其产品的寿命与自己包两方面的错误和安全补丁,负责。
Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.
本系列的第2部分主要关注DB 2安全性插件,这是实现DB 2安全性的新方法。
UNIX's method of handling file systems and volumes provides you with an opportunity to improve your computers' security and performance.
通过利用UNIX处理文件系统和卷的方法可以提高计算机的安全性和性能。
An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.
例如服务提供方要求采用一种特殊的加密方法,而服务请求方没有支持这种加密方法的安全基础架构。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
Using SSH and VNC, you'll benefit by having a method that complies with the security requirements of most organizations and meets the needs of the members of your team.
通过使用SSH和VNC,可以满足大多数组织的安全需求,同时满足团队成员的需要。
Sugroups provides one method of implementing and managing the security policy on your systems.
sugroup提供一种在系统上实现和管理安全策略的方法。
With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.
了解了这些内容后,就更加容易理解并利用Acegi的方法安全性拦截器,下一节将具体介绍该主题。
Even though both these methods of authentication are more secure than RSH rhost-based authentication, you should choose the method that more closely matches your security requirements.
虽然这两种认证方法都比基于rshrhost的认证安全,但是您应该选择更符合自身安全需求的方法。
Method-level security of EJB components.
EJB组件的方法级安全性。
Returning to the schema, to fetch the social security number of type xs: string that's inside the policyholder-information complex type, XMLBeans provides the following method.
让我们再回到模式,为了提取policyholder -information复杂类型中的xs:string类型的社会安全号,XMLBeans提供了以下方法。
The snippet in Listing 9 shows how to call the EJB method under the identity of a subject whose credentials were received from the security handler.
清单9中的片段展示如何从安全处理程序接收主体的凭证,并以这个主体的身份调用EJB方法?
Listing 5 is a sample configuration of Acegi's method security interceptor.
清单5展示acegi的方法安全性拦截器的示例配置。
In this article, you'll explore a method that improves the security of your LAMP installation by using the mod_proxy module and multiple back-end servers.
在本文中,您将学习一种使用mod_proxy模块和多个后端服务器来改进lamp安全性的方法。
This part of the work is required regardless of the implementation method used, so there's a limit to how much improvement can be made to WS-Security processing times.
这一部分的工作是必需的,而与所使用的实现方法无关,因此WS - Security处理时间的改善是有限的。
The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.
术语WS-Policy指定义治理(例如传输方法)和安全性(如加密级别)的框架。
Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.
方法权限将安全性角色映射到特定的EJB方法而安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合是HTTp方法和URL模式的一个组合。
In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.
在这份共分三部分的系列文章中,我介绍了如何使用Acegi安全系统增强基于URL的安全性和基于方法的安全性。
The malware that led to the hacking of security giant RSA may have been a "zero-day attack" – ie, it had never been seen before – but the method of infection was nothing new.
恶意软件导致安全巨人RSA公司遭到“zero-day attack”攻击(指系统有缺陷,被黑客抓住而发起的攻击)--通过IE,以前没有发生过这种事--但是攻击的技术却是老套。
Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.
通过使用声明的安全,您可以定义EJB模块的集合描述符中的安全角色,并为每个角色分配方法许可。
The VA team used an AIE method to analyze which combination of optional components would be the most effective in reducing security-related losses.
VA团队使用AIE方法来分析可选组件的哪些组合会在减少安全相关的损失方面最有效。
The VA team used an AIE method to analyze which combination of optional components would be the most effective in reducing security-related losses.
VA团队使用AIE方法来分析可选组件的哪些组合会在减少安全相关的损失方面最有效。
应用推荐