The security of operating system is an important aspect of information security.
操作系统安全是信息安全的一个重要方向。
With function of protection ring and security kernel, a novel model for enhancing security of operating system is proposed.
利用保护环和安全内核的功能,提出了一种新的增强操作系统安全性的模型。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Subscribe to and read security bulletins to learn of threats to your operating system and application software, and determine whether each threat endangers your specific configuration.
订阅和阅读安全公告,了解您的操作系统和应用程序软件面临的威胁,判断这些问题是否会危害您的配置。
Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.
因此,运行这些命令的安全机制以文件的操作系统权限为基础。
You can customize the security mechanisms to meet your individual needs, instead of relying on a standard facility like the operating system.
不必依赖于操作系统之类的标准设施,相反,可以定制安全性机制以满足自己的需求。
The idea of security starts with our own local operating system (OS) environment.
安全理念起源于我们自己的本地操作系统(OS)环境。
Therefore, you can use it to provide an extra layer of security in addition to that provided by the native operating system.
因此,可以用它在本机操作系统提供的保护之外再额外增加一层保护。
The important point to remember is that these accounts are defined in a security facility outside of DB2 UDB — typically the operating system.
要记住的重点是,这些帐号是在DB 2UD b外的安全设施中定义的——通常是操作系统。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
Once you understand the concepts of TAMOS, you will be in a better position to provide security to your system resources on top of that provided by the native operating system.
一旦理解了TAMOS的概念,您就能在本机操作系统提供的保护之外为系统资源提供更好的保护。
Google is working with manufacturers on a new reference hardware to accommodate their speed and security requirements which are key features of their new operating system.
目前Google正与制造商合作来制定新的参考硬件标准以支持其速度和安全上的需求,而这正是其新操作系统最关键的特性。
He chose Fedora as the operating system for its frequent security updates, its RPM-based package-management system, and its quantity of prepackaged software pertinent to servers.
他选择使用Fedora作为操作系统,用于管理常用的安全更新、基于RPM的包管理系统,以及与服务器相关的软件包。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
In DB2 UDB, user and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system, in the form of a plug-in.
在DB 2UD b中,用户和组身份验证由DB 2UDB的外部设备以插件的形式来管理,如操作系统、域控制器或者Kerberos安全系统。
An important aspect of security patches is that depending upon the operating system, downtime may need to be scheduled.
关于安全补丁的一个重要方面,就是需要根据操作系统来安排停机时间。
When you learn how to write drivers for a given operating system, for instance, you'll learn something about the security weaknesses of that OS.
例如,当你学习如何为给定操作系统写驱动程序时,你将学到一些与操作系统的安全缺陷相关的东东。
This may include such things as use of various operating system services, WebSphere Application Server security, backend systems, and others.
这可以包括各种操作系统的使用、WebSphereApplicationServer安全性、备份系统以及其他方面。
When deploying a piece of software such as an operating system, application, or Web server, one of the biggest concerns is security.
在部署操作系统、应用程序或Web服务器等软件时,一个重要问题就是安全性。
The security architecture is made of a security gateway and an operating system library which tags data as it is being used by the web application.
整个安全架构由一个安全网关和一个操作系统库组成,Web应用可使用该操作系统库标记数据。
From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.
从目前来看,很多企业一直忽略的操作系统自身漏洞,导致黑客、恶意程序趁虚而入,给企业安全造成了严重危害。
To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.
在电力企业的综合信息管理系统中,必须从网络、操作系统、应用程序和业务需求等各方面来保证系统的安全。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
As an important component of high-level secure operating systems, the privilege control mechanism can provide an appropriate level of security assurance for the system.
特权控制机制是高安全等级操作系统中一个重要的组成部分,它能够提供系统恰当的安全保证级。
This paper puts forward a new framework of operating system security supporting application class security.
文章提出了一种支持应用类安全的操作系统安全结构框架。
As the key apparatus in electric power system, the operating reliability of large power transformer has deep influences on security and stability of power systems.
大型电力变压器作为电力系统的枢纽设备,其运行可靠性直接关系到电力系统的安全与稳定。
Operating system manages the computer resource directly, which security is the base of the computer system's security.
操作系统是计算机资源的直接管理者,其安全是整个计算机系统安全的基础。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
应用推荐