New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
Informix integrates operating system security functions for user authentication and network permissions.
Informix集成了操作系统安全性功能来对用户进行身份验证和管理网络权限。
Select the default Settings in the Enable operating system security for DB2 objects, and click on Next.
在Enableoperating system securityforDB 2objects中选择默认设置,然后单击Next。
This paper puts forward a new framework of operating system security supporting application class security.
文章提出了一种支持应用类安全的操作系统安全结构框架。
The framework assures the security implementation of application class security policy using operating system security services.
这个框架利用操作系统提供的安全服务为各种应用类安全策略的实施提供了安全保证。
In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed.
在对BLP模型进行分析的基础上,提出了以BLP模型为基础的完整性和特权角色扩展的UNIX操作系统安全模型。
Most operating system security mechanisms require that every piece of code must be completely trusted in order to run, except perhaps for scripts on a Web page.
多数操作系统安全机制要求每一段代码都必须完全受信任(网页的脚本可能除外),然后才可运行。
The most serious reliability and security problems are those relating to the operating system.
最严重的可靠性及安全问题是与操作系统相关的那些。
Subscribe to and read security bulletins to learn of threats to your operating system and application software, and determine whether each threat endangers your specific configuration.
订阅和阅读安全公告,了解您的操作系统和应用程序软件面临的威胁,判断这些问题是否会危害您的配置。
Usually, they want management through the operating system level, including OS patch management, and often want managed security services as well.
通常,他们需要操作系统级的管理、包括操作系统补丁管理、他们还需要受管的安全服务。
Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.
因此,运行这些命令的安全机制以文件的操作系统权限为基础。
An important aspect of security patches is that depending upon the operating system, downtime may need to be scheduled.
关于安全补丁的一个重要方面,就是需要根据操作系统来安排停机时间。
Rather it is a layer that extends the browser’s security model down into the operating system level.
它是构建在操作系统级别的一个服务层,以便扩展浏览器的安全模型。
You can customize the security mechanisms to meet your individual needs, instead of relying on a standard facility like the operating system.
不必依赖于操作系统之类的标准设施,相反,可以定制安全性机制以满足自己的需求。
The idea of security starts with our own local operating system (OS) environment.
安全理念起源于我们自己的本地操作系统(OS)环境。
In each scenario, the operating system is called to perform security checks.
在以上每个场景中,都调用了操作系统来进行安全性检查。
The main way rogue programs get into a system is by exploiting security holes in the operating system.
恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
By default, global security USES the local operating system user registry for authentication.
默认情况下,全局安全性使用本地操作系统用户注册表进行身份验证。
Therefore, you can use it to provide an extra layer of security in addition to that provided by the native operating system.
因此,可以用它在本机操作系统提供的保护之外再额外增加一层保护。
The important point to remember is that these accounts are defined in a security facility outside of DB2 UDB — typically the operating system.
要记住的重点是,这些帐号是在DB 2UD b外的安全设施中定义的——通常是操作系统。
The security server does the same task for the network as what is done by the operating system for the local system.
安全服务器对网络执行的任务与操作系统对本地系统执行的任务相同。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
Although the user list for the Web server and the operating system could be unified, usually they are kept separate for security, performance, and implementation purposes.
尽管可以统一Web服务器和操作系统的用户列表,但通常出于安全性、性能和实现目的考虑而将它们保持分离。
Like all Macs, these computers have, in my opinion, a better operating system, better built-in software and better security than their Windows competitors.
我认为,与Windows电脑相比,这两款电脑就像所有苹果电脑一样,拥有更好的操作系统、内置软件和更高的安全性。
Suppose you host your Web application on a "minority" operating system; you might rely on OpenBSD for its security, for example.
假设您在一个“非主流”操作系统上托管Web应用程序;比如,您可能会依赖OpenBSD来保证安全性。
You can also set up local account to Kerberos V5 account mappings, which is necessary to inform the operating system how to authorize a specific security principal.
还可以为KerberosV 5帐户映射建立本地帐户,这对告知操作系统如何对特定的安全主体进行授权非常必要。
It is important to stay current on operating system, httpd, php, and DB2 maintenance, particularly as related to security issues.
时时关注操作系统、httpd、php和DB2维护,尤其是事关安全的方面,这一点很重要。
User and group authentication is managed in a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
用户和组的身份验证是在DB 2外部的一个设施中,例如操作系统、域控制器或Kerberos安全系统中进行管理的。
This may include such things as use of various operating system services, WebSphere Application Server security, backend systems, and others.
这可以包括各种操作系统的使用、WebSphereApplicationServer安全性、备份系统以及其他方面。
应用推荐