With the security enhance of services to protect server and provide users with high performance services.
保证服务器的安全,并为用户提供高性能的服务。
This article shows you how to protect only user IDs and passwords, and not other information exchanged between client and server.
本文讲述了如何只是保护用户ID和密码,而不保护客户端和服务器间交换的其他信息。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
With the leading edge DataPower SOA Appliance, it is easy to protect your MDM Server deployment and appropriately apply authentication, authorization, and audit policies for consistent enforcement.
通过使用前沿的DataPowerSOAAppliance,您可以轻松保护MDMServer部署,以及正确、一致地应用身份验证、授权和审计策略。
Let's identify the various known steps you should take to protect the WebSphere application Server infrastructure and applications from these four forms of attack.
我们来讨论一下要保护WebSphereApplicationServer基础设施和应用程序免受这四种形式的攻击应该采取的各种已知的步骤。
WebSphere Application Server provides a security infrastructure and mechanisms to protect sensitive JEE resources and administrative resources.
WebSphereApplicationServer提供安全基础设施和机制以保护敏感的JEE资源和管理资源。
We are now going to identify the various known steps you should take to protect the WebSphere application Server infrastructure and applications from these four forms of attack.
现在,我们将确定要保护WebSphereApplicationServer基础设施免受这四种形式的攻击应该采取的各种已知的步骤。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
The UsernameToken specification allows for the use of a one-way secure hash to protect the password called a digest, but this functionality is not provided in Application Server V6.
UsernameToken规范允许使用单向安全哈希来保护摘要形式的密码,但ApplicationServerv6中没有提供该功能。
If that's the case, you should take extra steps to protect the traffic from the Web server to the Web container.
如果是这种情况,应该采取额外步骤保护从Web服务器到web容器的通信流。
This may be to protect the Process Server and WESB infrastructure itself, but it's equally likely that you do not want to overload the downstream systems.
这可以保护ProcessServer和WESB基础设施本身,同样,还可以防止下游系统出现超载。
You will introduce a reverse proxy server to protect the Web server installed on the application tier.
您将引入一个反向代理服务器来保护安装在应用层的Web服务器。
Some nameservers protect part of the namespace, meaning that you can publish only to those areas where you are allowed. Let's assume that you have an LDAP server running, and these are its details
一些命名服务器会保护部分命名空间,这意味着只能发布到允许的区域。
On the Netegrity SiteMinder Policy server, you will need to create the following objects in order to configure SiteMinder to protect your Sametime 6.5.x server
在NetegritySiteMinderPolicy服务器上,将需要创建如下对象,以配置 SiteMinder来保护您的Sametime 6.5.x 服务器。
You protect against application server loss by load balancing across multiple instances, allowing you to recover from various failures.
跨越多个实例进行负载均衡可防止应用程序服务器丢失,并允许您从各种故障中恢复。
To protect against both XPath injection and other forms of code injection, you should check all data passed from your Web server to your backend services.
要防止XPath注入和其他形式的代码注入,应该检查所有从Web服务器传到后端服务的数据。
How to protect the internal mail server and diminish the damage caused by the spams is the main topic of this paper.
保护内部邮件服务器,在最大程度上减少垃圾邮件对邮件服务器的破坏是该文将讨论的主题。
PFICS is a distributed file protect system which USES one server to protect file systems of multi-hosts.
PFICS采用一个服务器保护多个主机的文件系统,构成了一个分布式的实时文件保护系统。
Both of the IDS have advantages and disadvantages. HIDS is mainly used to protect important host or server and NIDS is mainly responsible to detect and protect entire network segment.
这两种系统各有优缺点,HIDS主要用来保护关键主机或服务器,而NIDS主要是负责监测和保护整个网段。
Encryption is the mechanism that helps to protect data as it passes between client and server.
加密机制帮助在客户端和服务器之间传递数据时保护数据。
Only by fully protect three key regions: the background server region, the middle of the front-end Web platform and the business end, to achieve high availability.
只有充分保障三个关键区域:后台服务器区域、中间的网络平台和前端的业务终端,实现高可用。
In order to protect the benefit of all users, the network does not allow using any P2P software, building the private server and huge network resources occupied by the application.
也是为了保护所有用户的利益,本网络内不允许使用任何P 2 P软件,建设私有服务器等大量占用网络资源的应用。
This permits the server specific software to protect itself from unauthorized intrusion.
通过该项行为服务器软件可以自保,不受非法入侵损害。
XKMS server adopts synchronous processing mode, using SSL protocol to insure the security of message transmission, employs two-phase request protocol to protect against denial of service attack.
XKMS服务采用同步消息的传输模式,以SSL协议保证消息传递的安全性,以两阶段请求协议来防止拒绝服务攻击。
XKMS server adopts synchronous processing mode, using SSL protocol to insure the security of message transmission, employs two-phase request protocol to protect against denial of service attack.
XKMS服务采用同步消息的传输模式,以SSL协议保证消息传递的安全性,以两阶段请求协议来防止拒绝服务攻击。
应用推荐