• ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.

    ObjectGrid自己并不提供任何现成的安全性实现提供了安全性插件以便实现所选择安全性机制

    youdao

  • Security is easier to implement in all these scenarios with tools added to the mix that operate at the level of individual messages rather than per-connection or per-queue.

    所有这些场景中,借助在各个消息级别上、不是每个连接或每个队列上操作产品组合中添加工具安全性容易实现

    youdao

  • As such, it is an excellent place to implement security features.

    这样的话,一个实现安全特性的绝佳地点

    youdao

  • The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.

    共同思路我们消息传递实现安全模型需要我们使用消息传递的方式保持同步

    youdao

  • You can implement high security with a single command.

    只需个命令实现很高安全性

    youdao

  • Channel auto-definition exits are required to implement security exits on cluster channels in a mixed-platform cluster.

    混合平台的集群中,需要通道自动定义出口集群通道实现安全出口。

    youdao

  • It also includes sample security plug-in programs, and shows you how to implement them step by step.

    本文提供了一些安全性插件程序示例展示如何逐步实现它们

    youdao

  • Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.

    治理风险管理提供更大SOA环境中实现强制执行安全策略机制

    youdao

  • Functional requirements are functions that the program performs to implement the security objectives.

    功能性需求程序实现安全性目标所执行功能

    youdao

  • Application developers should keep whatever code they need to write to implement the required security functionality in some separate module that will be replaced by bought infrastructure over time.

    应用程序开发者应该他们实现所需安全性功能而需要编写所有代码都保留某个单独模块中,将来这个模块买来基础架构代替

    youdao

  • Another alternative might be to use generic connections for resources and implement certain application-level security.

    另一种替代方法可能资源使用通用连接实现某种应用层安全性

    youdao

  • To secure your AIX system, you may need to implement hundreds of security Settings.

    为了保护AIX系统可能需要实现数百安全设置

    youdao

  • Until we develop and implement usable logging and monitoring standards and facilities, it's difficult - if not impossible - to implement security controls that require logging and monitoring.

    直到我们制定出可用的关于记录监测标准实施成为工具之前,是很难——甚至说是可能——实现需要记录和监测的安全控制的。

    youdao

  • The example in this article has shown you how to implement the security configuration.

    本文的示例展示如何实现安全性配置。

    youdao

  • To further increase security, you can implement logging of failed login attempts.

    进一步增强安全性还可实现登录尝试失败日志记录

    youdao

  • This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.

    本文并不讨论如何保护 AIX如何实现安全策略而是讨论密码策略相关的应该注意属性

    youdao

  • For a scenario like this one, you would need to implement more fine-grained security applying different access rights to different portions of the document.

    对于此类场景,需要实现更加细粒度安全性文档的不同部分应用不同的访问权限

    youdao

  • To implement security, profiles can be defined in the MXTOPIC class to match the TOPIC objects.

    实现安全性可以在 MXTOPIC定义配置文件匹配 TOPIC 对象。

    youdao

  • Only six months after Suqian began to implement the policy, security volunteers have increased to 38, 000 people, with 1, 521 being rewarded with 206, 400 yuan.

    宿迁市开始实行这项政策六个月里保安志愿者人数增加38,000,其中1,521受到奖励,总金额达到206,400元。

    youdao

  • When securing digital information, it is important to implement end-to-end security.

    保护数字信息时,实现全程安全性重要的。

    youdao

  • Using the JAAS interface for application security can dramatically reduce the effort required to implement an effective security layer and simultaneously increase the safety of the system.

    应用程序安全使用JAAS接口显著减小实现有效安全所需努力同时增加系统安全性

    youdao

  • Essentially, security administrators can code to the GSS-API and implement virtually any supported security mechanism that supports this interface.

    本质上是安全管理员可以对于GSS -API进行编码真正实现支持接口的、受支持的安全机制

    youdao

  • Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.

    SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法

    youdao

  • After coming to TSA with 26 years of law enforcement experience at the FBI, I understand the serious threats our nation faces and the security measures we must implement to thwart potential attacks.

    联邦调查局工作了26着这26年执法经验来到运输安全管理局,我了解我们国家面对严重威胁,深知我们采取安全措施阻止潜在袭击的必要性。

    youdao

  • When you develop a security plug-in, you will need to implement the standard authentication functions that DB2 UDB invokes.

    开发安全插件时,需要实现DB 2udb调用标准身份验证函数

    youdao

  • There's no need for you to implement security features because they're already integrated.

    我们不必实现安全特性因为早已集成了

    youdao

  • As more companies implement data security measures, audits will likely bring to light older, overlooked breaches from the past.

    随着越来越多公司部署数据安全措施审计报告有可能揪出很多被忽视旧账

    youdao

  • It is much easier to implement security as you start an application then to try to add it in later on.

    先开始开发应用然后考虑安全问题容易得多。

    youdao

  • If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.

    如果Web服务定义WSDL描述某种东西”,那么一致的方式非soap服务描述实现安全性需要更多工作

    youdao

  • If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.

    如果Web服务定义WSDL描述某种东西”,那么一致的方式非soap服务描述实现安全性需要更多工作

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定