• In fact, if you look at an official Olympic security map you can see we are actually inside the venue perimeter.

    事实上如果一下官方奥运安保地图可以看到我们其实场馆周围内部

    youdao

  • After you select the security file to import, map roles.

    选择导入安全文件之后映射角色

    youdao

  • These functions internally map with AIX security functions to handle user management tasks under different directories.

    这些函数AIX安全性函数进行内部映射处理不同目录用户管理任务

    youdao

  • Part 1 of this series focuses on the road map, which provides a simple, 10-step process that serves as an overall guide for an SOA security team.

    系列 第 1部分重点讨论路线图,此路线图提供简单的 10 步骤流程,可作为SOA安全团队的总体指南

    youdao

  • Specifically, it requires that <security-realm> be used to authenticate user logins and principals, and <role-mappings> to map roles defined in Pluto's Web deployment descriptor (web.xml).

    特别是要求使用 <security-realm>验证用户登录主要角色使用 mappings>映射PlutoWeb部署描述符 (web.xml)中定义的角色。

    youdao

  • Listing 2 shows how you can set the username and password for WS-Security handling in this property map.

    清单2演示如何在属性映射WS - Security处理设置用户密码

    youdao

  • In design, we reevaluate and map these into design mechanisms that are specific solutions to the analysis needs for persistence (Table 8), security (Table 9), and legacy interface (Table 10).

    设计阶段,我们重新评估这些东西,把它们对应设计机制中,这些设计机制根据持续性(8)、安全性(表9)遗留界面(表10)所需分析做出的特殊解决方案

    youdao

  • Thus when processing a web services request, the provider needs to map the asserted identity to credentials that are valid for its security domain.

    因而处理Web服务请求时,提供者需要断言身份映射对于安全有效凭证

    youdao

  • This user ID must map to a meaningful name in the WebSphere Application Server security registry.

    用户ID必须映射WebSphere安全注册中心意义的名称

    youdao

  • Therefore, you need to map the security roles defined by the execution server to the correct user groups (Figure 12).

    因此需要ExecutionServer定义安全角色映射正确用户(12)。

    youdao

  • This lets you map Notes IDs or Notes group IDs to external system security, thereby extending Domino security and mapping it to security policies already established for the external system.

    允许NotesIDs Notesgroup IDs映射外部系统安全性从而扩展Domino 安全性映射外部系统建立安全政策

    youdao

  • In the geronimo-web.xml web application deployment plan, we map the EJB references defined in web.xml to specific EJBs, and map the security roles to principals.

    geronimo - web . xmlweb应用程序部署计划我们将web .xml定义EJB引用映射特定EJB安全角色映射到主体。

    youdao

  • Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    方法权限安全性角色映射特定EJB方法安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法URL模式的一个组合

    youdao

  • After you map roles, specify how collisions should be resolved if any are detected during the import of the security file.

    映射角色指定安全文件导入过程中出现冲突的解决方式

    youdao

  • Use the WebSphere binding extension properties to map the security roles to an authentication status.

    使用WebSphere绑定扩展属性安全角色映射身份验证状态。

    youdao

  • You then map the security roles to principals in the Community Edition specific deployment plan.

    然后安全角色映射CommunityEdition特定部署计划中的主体

    youdao

  • Go to Step 9: Map security roles to users or groups.

    Step9Map securityroles tousersor groups。

    youdao

  • Go to Step 8: Map security roles to users or groups.

    Step8Map securityroles tousersor groups。

    youdao

  • The window for Step 4, Map security roles to users/groups, displays as shown in figure 14. Do the following

    显示窗口Step4,Map securityroles tousers/groups如图 14 所示。

    youdao

  • map for Active Directory running on Windows 2000 and 2003, and /etc/security/ldap/sfur2group.

    对于运行Windows 2003 R2 的ActiveDirectory,组映射文件 /etc/security/ldap/sfur2group.map

    youdao

  • System security modules, map operation modules and data management modules are included in this software.

    软件包含系统安全模块地图操作模块、数据管理模块。

    youdao

  • The dissertation draws the analytic map about the multifactor indices and the stability diagram about zoning indices rank of setting up the security coal pillar .

    输出了因素指数分析图安全煤柱区划指标等级稳定性

    youdao

  • Chaos map and singular value decomposition of matrix technology are introduced to improve the watermarking imperceptibility, security and robustness of watermark image.

    利用混沌映射结合矩阵奇异分解,将水印信息分散原始图像不同位置,提高了水印的视觉效果,保证了水印的安全性。

    youdao

  • The paper mainly studies the latter. We make use of the super-chaos configuration and parameter map in the digital information transmitting, which are proved to be with high security by simulation.

    本文分析前者之后,主要讨论了混沌同步在数字信息传输中的应用,分别利用一类超混沌构造参数映射法传输数字信号,仿真结果表明达到了较好的保密效果。

    youdao

  • In this paper, a typical map of this kind, namely, the baker map, is further extended to be three-dimensional and then used to speed up image encryption while retaining its high degree of security.

    本文这种典型地图贝克地图,进一步扩大立体式的,然后用于加速图像加密同时保留高度安全性

    youdao

  • This paper proposes a fine-grained radio-map localization based information security boundary in sensor network.

    提出一种利用传感器网络精细电子地图定位建立信息安全边界的方法。

    youdao

  • Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.

    工具说明GS - DES文档安全系统中,没有安装了客户端后,无法查看加密的文件。

    youdao

  • Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.

    工具说明GS - DES文档安全系统中,没有安装了客户端后,无法查看加密的文件。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定