Therefore, deleting a parent code group destroys any security behavior that was defined in its child hierarchy.
因此,删除父代码组将破坏已在其子层次结构中定义的所有安全行为。
Demands and overrides are used in libraries to help protect resources from callers or to override default security behavior.
要求和重写在库中用来帮助防止调用方调用资源或重写默认安全行为。
By configuring a policy set for the services and references in the sample, you were able to change the security behavior of the services without making any changes to the business logic.
通过为示例中的服务和引用配置策略集,您可以更改服务的安全行为,而无需对业务逻辑进行任何更改。
Further details on Security and how to customize the default portal behavior will be given in a future article of this series.
关于安全性的进一步细节以及如何自定义缺省门户行为将在本系列的后续文章中介绍。
Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.
通常,这是一种很好的行为,因为它防止了在访问网页时跨站点脚本安全性隐患的发生。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
This behavior for topic security runs counter to the usual behavior of RACF profiles, where the profile that is the best match applies.
主题安全性的这种行为与RACF配置文件的正常行为相矛盾,后者采用最匹配的配置文件。
The default behavior for EJB security when global security is turned on has changed.
当全局安全性开启时用于ejb安全性的缺省行为已经被改变了。
Prior to the advent of aspect-oriented programming (AOP), however, it was difficult to write certain kinds of tests for crosscutting behavior such as security, transaction management, or persistence.
不过,在面向方面编程(AOP)出现之前,为横切行为(如安全、事务管理或者持久性)编写测试很困难。
With the DB2 UDB security plug-in architecture, you can customize its authentication behavior by either developing your own plug-ins, or buying plug-ins from a third party.
利用DB 2UDB安全插件架构,您可以通过开发自己的插件或从第三方购买插件的方式来定制身份验证行为。
To enable you to customize DB2 UDB authentication behavior, DB2 UDB has exposed APIs that you can use to modify existing plug-ins or build new security plug-ins.
为了允许定制DB2UDB身份验证行为,DB2 UDB 提供了可用来修改现有插件或构建新的安全插件的API。
The practitioner who is concerned with intuitive and correct behavior, performance, reliability, usability, availability, and security associated with the development environment
参与和开发环境相关联的直觉的和正确的行为、性能、依赖性、可用性、有效性、以及安全性;
Enhances security by reducing poor end-user password behavior.
减少不良使用者密码行为,借此强化安全。
As for spam, ISPs (including mail service providers) could limit their users to, say, 100 e-mails a day; for more, you have to pay or at least post a security bond, or pass some good behavior test.
对于垃圾邮件,网络服务商(包括邮件服务商)应该对用户有所限制,比如说每天只能发一百封邮件,更进一步说,你得付费,或至少发布安全债券,或通过一个好的行为测试才行。
The security architect can decide the type of behavior required for the application, and the application developer can use the appropriate variation from the WebSphere SPI.
安全架构师可以决定应用程序所需的行为类型,而应用程序开发人员可以使用WebSphereSPI 中合适的变体。
The default behavior depends on the user registry implementation configured for the WebSphere Application Server security component.
缺省行为取决于为WebSphereApplicationServer安全组件配置的用户注册中心实现。
The GSS-API default behavior will be to initiate the context for Kerberos security mechanism.
GSS-API 的默认行为是为Kerberos安全机制启动上下文。
HTML5 sandbox - a security feature to sandbox third party content on the website, to prevent malicious behavior like cookie stealing, form submission or page redirection.
HTML5SandBox——该安全特性可以将网站上的第三方内容放在沙箱当中,防止诸如Cookie窃取、表单提交或是页面重定向等恶意行为。
Security patches and upgrades to client software add even more complexity because they alter application behavior.
安全补丁和升级到客户端软件添加更复杂,因为它们改变应用程序的行为。
Your software should be able to recover from the security exceptions that might arise from its normal behavior as well as alter its functionality seamlessly.
您的软件应该能够重新获得这些有可能被一些正常行为所抛出的安全性异常同时无缝地改变他的功能。
"Security" management theory through the study of unsafe behavior, based on the establishment of a system of employee behavior, the mechanism of improving safety performance.
“行为安全”管理理论通过对不安全行为的研究,建立一套基于员工行为的、系统的、改进安全绩效的机制。
Insurance consumption is a course or behavior that people meet their own security needing of health, life-span and property through enjoying the insurance products or the insurance service.
保险消费就是人们通过消耗或享用保险产品或保险服务来满足自己的身体、寿命、财产安全保障需要的过程或行为。
At this high end of the spectrum of conscious and enlightened BEING, our behavior, thinking and speaking are the outward ways by which we convey a sense of inner strength and security.
在有意识的,受启迪的本体范畴的最高端,我们的行为,思考和说话是我们传递内心力量很安全感的外在方式。
Policy driven behavior, particularly for service level, security and quality of service capabilities (for example, WS-Policy)
策略驱动的行为,特别是对于服务级别、服务功能的安全和质量(例如 Web 服务策略(WS-Policy))
It is very important to understand the relationship between price formation mechanisms and security price behavior both in theory and in practice.
理解价格形成机制与证券价格行为之间的关系,无论从理论上还是从实务上来说都很重要。
The Security Administration Punishment Act provides the illegal behavior of stirring up fights and causing troubles.
新颁布的《治安管理处罚法》规定了寻衅滋事治安违法行为。
The Security Administration Punishment Act provides the illegal behavior of stirring up fights and causing troubles.
新颁布的《治安管理处罚法》规定了寻衅滋事治安违法行为。
应用推荐