• A JAAS-based security implementation.

    一个基于JAAS的安全实现

    youdao

  • Completeness: How complete is the security implementation?

    完整性安全实现完整程度

    youdao

  • Follow an SDLC process for an SOA security implementation.

    遵循soa安全实现的SDLC流程

    youdao

  • Step 7. Follow an SDLC process for an SOA security implementation.

    第7遵循soa安全实现SDLC流程

    youdao

  • As mentioned above, the message flow security implementation depends on an external security provider.

    上文所述,消息安全性实现依赖外部安全性提供者

    youdao

  • Security QoS specifies whether a service invocation supports security and the exact security implementation.

    安全QoS 定义了服务调用是否需要支持安全以及明确的安全实现。

    youdao

  • As far as the average program is concerned, the details of the security implementation don't matter very much.

    一般程序来说安全性实现细节并不重要

    youdao

  • You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.

    描述Synapse时,讨论了安全某些方面包括WS - Security实现

    youdao

  • All these standards generate their own set of specific requirements that affect the overall SOA security implementation.

    所有这些标准都有自己一组特定需求,会总体soa安全实现造成影响

    youdao

  • Question: Axis WS-Security implementation is based on handlers so that you can don't have to change the code to secure it.

    AxisWS-Security实现基于处理程序的,所以不必通过更改代码保护

    youdao

  • The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.

    安全政策执行首要策略有可能通过一个约定俗成过程开发的。

    youdao

  • Gluecode ships with a login module for LDAP that can be configured against LDAP servers for a more robust security implementation.

    gluecodeldap所附带登录模块能够针对LDAP服务器进行配置,以得到一个更为健壮安全实现。

    youdao

  • The framework assures the security implementation of application class security policy using operating system security services.

    这个框架利用操作系统提供的安全服务为各种应用安全策略实施提供安全保证

    youdao

  • For the security implementation to function correctly, the servlet is put into the secured area that only authenticated auditors and users can access.

    为了让安全实现正确发挥作用servlet放到保护区域,以便只有通过认证审计员用户可以访问。

    youdao

  • The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.

    COE具备开发soa安全参考体系架构、安全标准基于场景的安全实现策略最佳实践的内在能力

    youdao

  • ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.

    ObjectGrid自己并不提供任何现成的安全性实现提供了安全性插件以便实现所选择安全性机制

    youdao

  • You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.

    负责通过制定详细项目计划预算清楚地说明和反映soa安全实现所必需的东西确保每个人都对此心里有底。

    youdao

  • The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.

    基本的观念对于任意成功SOA安全实现而言,构造良好的HLD非常关键,SEA带领 SOA 安全团队进行创建工作负有最终责任

    youdao

  • This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.

    视图对于调试过程非常有用,但是生产中启用因为披露实现细节,可能会影响安全性

    youdao

  • The services are managed for identity and compliance through proper service-level security design and implementation.

    通过适当服务水平安全性设计实现对服务进行标识遵从性管理

    youdao

  • Implementation: at this level, you define the security identity of the SCA component.

    实现级别可以定义sca组件安全标识

    youdao

  • Because of this review, it could address security issues before purchase and implementation, or they would block implementation as designed.

    由于这些审核IT购买实施涉及到安全问题否则他们就会阻止设计去实施。

    youdao

  • Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.

    分配用户角色可以定制安全策略设计实现中,以及定制的工作流事件升级流中。

    youdao

  • Centralizing the implementation of security policies, log analysis and reporting is a good thing.

    安全策略日志分析报告中心化实现是个不错主义。

    youdao

  • The report focuses on security program management, implementation and system administration of intelligence activities.

    报告主要针对安全计划管理以及情报活动执行系统管理

    youdao

  • For example, these proprietary IOR components could encode the ORB type and version or help support an ORB implementation of the OMG Security Service.

    例如这些专用IOR组件可以编码OR b类型版本或者帮助支持OMG安全服务OR B实现

    youdao

  • A review of security requirements and implementation is an important part of this stage of the assessment.

    安全需求实现检查一阶段评估的重要部分

    youdao

  • Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.

    继续系列中的一篇文章其中继续探索仓库ETL过程设计实现、仓库性能安全性等。

    youdao

  • Implementation must be done properly to avoid any security issues.

    必须对其进行正确的实现避免产生任何安全问题。

    youdao

  • The security constraints and conditions are attached to the implementation artifacts.

    安全约束条件附加实现构件的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定