The catalog service example USES patterns such as the WS Response Template pattern (see Resources) and security patterns.
catalog服务示例使用了WS响应目标模式(请参阅参考资料)和安全模式等模式。
There are deployment patterns, security patterns, application patterns, and patterns that deal with operational and runtime aspects.
还有部署模式、安全模式、应用程序模式以及处理操作和运行时问题的模式。
Also, applying common security patterns in the REST world doesn't seem to be as established as in SOAP, where WS-Security is becoming more widely embraced.
在SOAP中WS - Security越来越被广泛采用,但REST世界中的应用公共安全模式和SOAP中不一样。
As an acknowledgement of the importance of security, we provide an "Identify security Patterns" task that ensures the level of security required by the system.
为了认识到安全重要性,我们提供了一个“IdentifySecurity Patterns”任务,它可以保证系统所需要的安全级别。
Wenchuan Earthquake and the great development of Longmenshan tourism presents severe problems involving geological disasters and tourist security patterns.
汶川大地震与旅游大开发几乎在同时段发生,给我们提出了地质灾害与旅游安全格局的严峻命题。
Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.
另一个常见的趋势是,应用服务网关模式来为服务端点提供增强的访问安全。
Technical patterns - These encompass transactions, security, and other infrastructure elements.
技术模式——包括事务、安全性和其他基础结构元素。
The specification also discusses JMS message types, security concerns and message exchange patterns.
该规范同时还讨论了JMS消息类型,安全考虑以及消息交换模式。
Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.
各个中介模式被适当地放在中介流中以实现预期的交互目标,以及执行管理和安全策略。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
Low food security is defined as reports of reduced quality, variety, or desirability of diet and indications of disrupted eating patterns.
食物质量降低,品种减少,或者是膳食不合理和习惯性的不良饮食习惯等在报道中都被称为食物安全系数低。
You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.
通过创建ABB以描述企业关键系统组成与行为性的模式,您可以为域架构视图建模,例如应用、基础设施(Infrastructure)、网络和安全。
Use cases affected by this trade-off are RESTful URLs, bookmarking support, security through URL patterns, and page-flow validation, to mention a few.
受此影响的用例是RESTfulURL、书签支持、通过URL模式获得的安全性以及页面流验证等。
In defining security models and patterns there are two facets that need to be considered.
在定义安全模型和模式时,需要考虑两个方面。
Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.
方法权限将安全性角色映射到特定的EJB方法而安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合是HTTp方法和URL模式的一个组合。
In order to address those challenges, architects will need to combine the data federation pattern with other security-related patterns.
为了应对这些挑战,架构师将需要把数据联合模式与其他安全相关的模式结合使用。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
On the ten anniversary, the global report highlights the challenges and opportunities faced by the security team in defense of evolving cyber crime and changing attack patterns.
在十周年之际,该全球报告强调了安全团队在防御不断演进的网络犯罪和不断变化的攻击模式时,所面临的挑战和机遇。
0ther patterns — such as a WS-security pattern — that directly impact the service definition would be applied at this layer.
其他直接影响服务定义的模式——如WS - security模式——也可应用于这个层。
Supervise each shift security operations, ensuring adequate patrol patterns and frequencies are maintained to ensure the security of guests and Team Members.
指导监督各班的运作,确定保卫巡视的正确执行,确保对客人和同事实施安全保卫工作。
But security firms have now got better at spotting patterns in the spammers' output.
但是安全公司现在在识别垃圾邮件发送者的输出模式方面已经有所进步。
Its software can monitor the use of cloud application by individual employees, and this includes looking for patterns and anomalies that could be security breaches.
它的软件能够监控单个员工对云应用的使用,还能搜索到有可能形成安全泄露的使用模式和异常现象。
The reflective widely used in kinds of costumes security, safety shoes&hats and other safety product, according to the samples you can order various kinds of patterns.
反光晶格带广泛应用于各种安全服饰、安全鞋帽及其它各种安全制品,可依据客户来样订制各种图案。
They say these patterns are unique to different typists and could lead to a new type of biometric security, locking out anyone who doesn't type like you do.
他们表示这种键盘的模式对每个打字者都是独一无二,而且可以引导一种新的生物识别安全性能,从而拒绝那些打字类型截然不同的人。
The use of unique physical characteristics, such as fingerprints, voice patterns, or retinal scan, to authenticate a user; providing security for workstations or information stored in hard drive.
使用独特的物理特征,例如指纹、声音模式,或视网膜扫描来鉴别一个用户,为工作站或存储子硬盘的信息提供安全保证。
Concerning one class of block ciphers, an Sboxes reorganized algorithm was given, which enriched Sboxes application patterns and improved the security strength.
针对一类分组密码算法,通过将S盒与密钥相关联,给出了S盒重组算法,丰富了S盒的应用模式,有效提高了分组密码的安全强度。
Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.
二进制代码提升过程中一些指令无法解析,甚至会出现跳转地址不合法之类的结构性的错误,使得后续的分析精确性降低。
Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.
二进制代码提升过程中一些指令无法解析,甚至会出现跳转地址不合法之类的结构性的错误,使得后续的分析精确性降低。
应用推荐