In fact, if you look at an official Olympic security map you can see we are actually inside the venue perimeter.
事实上,如果看一下官方奥运安保地图你可以看到我们其实在场馆周围内部。
After you select the security file to import, map roles.
选择要导入的安全文件之后,映射角色。
These functions internally map with AIX security functions to handle user management tasks under different directories.
这些函数可与AIX安全性函数进行内部映射,以处理不同目录下的用户管理任务。
Part 1 of this series focuses on the road map, which provides a simple, 10-step process that serves as an overall guide for an SOA security team.
本系列的 第 1部分重点讨论路线图,此路线图提供了简单的 10 步骤流程,可作为SOA安全团队的总体指南。
Specifically, it requires that <security-realm> be used to authenticate user logins and principals, and <role-mappings> to map roles defined in Pluto's Web deployment descriptor (web.xml).
特别是,它要求使用 <security-realm>验证用户登录和主要角色,并使用
Listing 2 shows how you can set the username and password for WS-Security handling in this property map.
清单2演示如何在属性映射中为WS - Security处理设置用户名和密码。
In design, we reevaluate and map these into design mechanisms that are specific solutions to the analysis needs for persistence (Table 8), security (Table 9), and legacy interface (Table 10).
在设计阶段,我们重新评估这些东西,并把它们对应到设计机制中,这些设计机制是根据持续性(表8)、安全性(表9)和遗留界面(表10)所需的分析做出的特殊解决方案。
Thus when processing a web services request, the provider needs to map the asserted identity to credentials that are valid for its security domain.
因而,当处理Web服务请求时,提供者需要将断言的身份映射到对于它的安全域有效的凭证。
This user ID must map to a meaningful name in the WebSphere Application Server security registry.
此用户ID必须映射到WebSphere安全注册中心中有意义的名称。
Therefore, you need to map the security roles defined by the execution server to the correct user groups (Figure 12).
因此,需要把ExecutionServer定义的安全角色映射到正确的用户组(图12)。
This lets you map Notes IDs or Notes group IDs to external system security, thereby extending Domino security and mapping it to security policies already established for the external system.
这允许您把NotesIDs或 Notesgroup IDs映射到外部系统安全性,从而扩展Domino 安全性并将它映射到为外部系统建立的安全政策。
In the geronimo-web.xml web application deployment plan, we map the EJB references defined in web.xml to specific EJBs, and map the security roles to principals.
在geronimo - web . xmlweb应用程序部署计划中,我们将web .xml中定义的EJB引用映射到特定的EJB,并将安全角色映射到主体。
Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.
方法权限将安全性角色映射到特定的EJB方法而安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合是HTTp方法和URL模式的一个组合。
After you map roles, specify how collisions should be resolved if any are detected during the import of the security file.
映射角色后,指定安全文件导入过程中出现的冲突的解决方式。
Use the WebSphere binding extension properties to map the security roles to an authentication status.
使用WebSphere绑定扩展属性将安全角色映射到身份验证状态。
You then map the security roles to principals in the Community Edition specific deployment plan.
然后将安全角色映射到CommunityEdition特定部署计划中的主体。
Go to Step 9: Map security roles to users or groups.
转到Step9:Map securityroles tousersor groups。
Go to Step 8: Map security roles to users or groups.
转到Step8:Map securityroles tousersor groups。
The window for Step 4, Map security roles to users/groups, displays as shown in figure 14. Do the following
将显示窗口Step4,Map securityroles tousers/groups,如图 14 所示。
map for Active Directory running on Windows 2000 and 2003, and /etc/security/ldap/sfur2group.
对于运行于Windows 2003 R2 的ActiveDirectory,组映射文件为 /etc/security/ldap/sfur2group.map。
System security modules, map operation modules and data management modules are included in this software.
该软件包含了系统安全模块、地图操作模块、数据管理模块。
The dissertation draws the analytic map about the multifactor indices and the stability diagram about zoning indices rank of setting up the security coal pillar .
输出了多因素指数分析图和留设安全煤柱的区划指标等级稳定性图。
Chaos map and singular value decomposition of matrix technology are introduced to improve the watermarking imperceptibility, security and robustness of watermark image.
利用混沌映射结合矩阵奇异分解,将水印信息分散在原始图像的不同位置,提高了水印的视觉效果,保证了水印的安全性。
The paper mainly studies the latter. We make use of the super-chaos configuration and parameter map in the digital information transmitting, which are proved to be with high security by simulation.
本文在分析前者之后,主要讨论了混沌同步在数字信息传输中的应用,分别利用一类超混沌构造法和参数映射法传输数字信号,仿真结果表明达到了较好的保密效果。
In this paper, a typical map of this kind, namely, the baker map, is further extended to be three-dimensional and then used to speed up image encryption while retaining its high degree of security.
本文对这种典型的地图,即贝克地图,进一步扩大到是立体式的,然后用于加速图像加密,同时保留其高度的安全性。
This paper proposes a fine-grained radio-map localization based information security boundary in sensor network.
提出一种利用传感器网络精细电子地图定位建立信息安全边界的方法。
Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.
工具说明:GS - DES图文档安全系统中,没有安装了客户端后,无法查看被加密的文件。
Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.
工具说明:GS - DES图文档安全系统中,没有安装了客户端后,无法查看被加密的文件。
应用推荐