In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.
在传统的桌面环境中,用户数据常常存储在用户的设备上,这会在用户私有信息和公司智能资产的安全性方面造成问题。
Progress of mankind needs a peaceful environment. Stability and security of one country cannot be built on turbulence or crisis of another.
人类进步需要和平的环境,一国的稳定安全不可能建立在别国的动荡危机之上。
Energy, climate change, and stabilizing fragile and post-conflict states were economic issues and not just part of the global dialogue on security and the environment.
能源、气候变化以及脆弱和后冲突国家的稳定等问题实际上属于经济问题,而且不仅仅是全球安全与环境对话的内容。
Then specify the properties of deployment, security, connection, and so on, according to the setting of your deployment and runtime environment, similar to Figure 11.
然后,根据部署和运行时环境的设置,指定部署、安全、连接等的属性,见图11。
A large number of chemical weapons abandoned by Japan on the territory of China are still gravely damaging China's biological environment and the security of people's lives and properties.
日本遗弃在华的大量化学武器至今仍对中国的生态环境和人民生命财产安全造成严重危害。
The progress of humanity needs a peaceful environment. It is impossible for a country to achieve stability and security based on the upheavals and crisis of other countries.
人类进步需要和平的环境,一国的稳定安全不可能建立在别国的动荡危机之上。
On the other hand, Glassfish is a prominent application server and understanding its security is something required for anyone using it in production environment.
另一方面,GlassFish是一款优秀的应用服务器产品,要在生产环境中使用GlassFish,理解它的安全机制是很有必要的。
On the DB2 UDB server: an X.509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.
在DB2UDB服务器中:一张 X.509证书,一个PKI环境,以及一个支持 LIPKEY 的服务器端GSS-API安全插件。
The examples in this section will focus on an environment without administrative or application security enabled.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
We started with a note on the importance of security in a distributed environment and an overview of DCE security model.
我们首先强调了安全性对分布式环境的重要性,概述了DCE安全模型。
The Long Running Execution Environment (LREE) executes a single job while ensuring its required qualities of service (transactional integrity, restart capabilities, security, and so on) are achieved.
长时间运行执行环境 (LREE)执行单个作业,同时确保所需的服务质量(事务完整性、重新启动功能、安全等)。
The value you choose for the AUTHENTICATION parameter depends on your particular environment as well as local security policies.
为AUTHENTICATION参数选择的值依赖于具体环境和本地安全策略。
Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure.
在按需付费的基础设施中,灾难恢复、专用密钥管理和控件行为公开是SaaS环境中的主要安全性顾虑。
In an environment with WebSphere security enabled, you will also need to make provisions for the CSIV2 and SAS addresses (c, d, e), depending on your application and system requirements.
在启用了WebSphere安全性的环境中,您还将需要提供CSIV2和SAS地址(c、d、e),取决于您的应用程序和系统需求。
Part 1 of this two-part article discussed several aspects of security, focusing on the core theme of hardening a WebSphere Application Server environment.
这篇分两部分的文章的第1部分讨论了安全性的几个方面,主要关注加强WebSphereApplicationServer环境的核心方案。
Depending on the WS-Security support your environment provides, you might be able to sign just the SOAP body, or you might be able to sign individual elements within the body.
取决于您的环境所提供的Web服务安全性(WS - Security)支持,您既可以仅仅对SOAP主体进行签名,也可以对Body内部的单个元素进行签名。
We've discussed numerous aspects of security, although we focused on the core theme of hardening a WebSphere Application Server environment.
虽然我们将重点放在加强WebSphereApplicationServer 环境这一核心主题上,但我们还讨论了有关安全性的很多方面。
Considering the environmental security request of shoe factories and practical project, we has designed an environment monitoring installment on the basis of DSP.
针对鞋厂环境安全的要求,并从实际工程出发,设计了一种基于DSP的鞋厂环境监测装置。
Bring forward a security data transmission approach in WAN-based environment on the background ofa WWW-based distributed information system.
文中在一种基于WWW的分布式信息系统的背景下,提出一种在广域网(WAN)的环境中安全传输数据的解决方案。
Our security, our prosperity, and our environment all require reducing our dependence on oil.
我们的安全、我们的繁荣和我们的环境都要求我们减少对石油的依赖。
When it comes to Web application security testing and remediation , focus on the urgent and important in your environment.
当谈到网络应用安全测试和修复,重点关注迫切和重要在您的环境。
A subscription per server for the Management Console, which enables administrators to manage Security Agents and generate reports and alerts on the security status of their environment.
该管理控制台,它使管理员能够管理安全代理,并生成报告,并就其环境安全状态警报订阅每个服务器。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
应用推荐