Identify your security requirements.
确定您的安全性需求。
Security requirements for SaaS applications.
SaaS应用程序的安全需求。
Security requirements for message transmission
消息传送的安全性要求
What are your performance, scaling, and security requirements?
性能、可伸缩性和安全要求是什么?
A traceability solution has significant security requirements.
可跟踪性解决方案有严格的安全性需求。
Consider the SSRM to address security requirements for the SOA.
考虑使用SSRM来处理SOA的安全需求。
Table 1: Security requirements satisfied by SOAP-DSIG and SSL 1.
表1:用SOAP - DSIG和SSL 1满足的安全性要求。
Satisfying security requirements without hamstringing programmers.
无需程序员即可满足安全需求。
Then you can concentrate on the security requirements of your program.
然后您可以将精力集中在您程序的安全性需求上。
A full implementation of all three security requirements would include.
所有这三个安全性需求的完整实现将包括。
This is a risk, especially when addressing stronger security requirements.
这会带来风险,在安全需求严格的环境中尤其如此。
Three security components came into play to meet our security requirements.
为满足我们的安全需求,需要运行三个安全组件。
Depending on the application, there can be additional security requirements.
根据应用程序的不同,可能会有额外的安全需求。
This is a problem, especially when addressing stronger security requirements.
这会造成问题,在安全需求严格的环境中尤其如此。
Let us now consider the range of security requirements that JACC might fulfill.
下面让我们看看JACC可能能够满足的一系列安全需求。
Analyze the security requirements and set up role models (define user types).
分析安全需要并设置角色模型(定义用户类型)。
Make sure you understand the security requirements for accessing your Web service.
确保您充分理解了访问您的Web服务的安全性需求。
Here, I'll consider authentication as involving two kinds of security requirements.
在这里,我将身份验证看作是两种安全性要求的结合。
Satisfy the entire set of security requirements listed in the requirements document.
满足需求文档中列出的整个安全需求集。
Table 1 summarizes which security requirements can be satisfied by SOAP-DSIG and SSL.
表1总结了哪些安全性要求能通过SOAP -DSIG和ssl来满足。
A multi-tenant, efficient SaaS application has several security requirements including.
多承租者、高效的SaaS应用程序具有以下几点安全需求。
You may prefer another method, depending on your security requirements and personal preferences.
您可能更喜欢其他方法,具体的使用取决于安全需求和个人爱好。
How can security requirements be met, such that each user sees only what she is supposed to see?
如何满足安全性需求,使每个用户只看到他/她应该看到的内容。
Good security requirements and analysis practices will significantly reduce system security risk.
良好的安全需求与分析实践将极大地减少系统安全风险。
But once the system has been installed to meet security requirements, only half the battle is won.
但是为了确保满足安全性需求而安装系统之后,整个战役才打赢了一半。
Here, the "SOA security cloud" represents all security services meeting all SOA security requirements.
这里的“SOA安全集合”代表满足所有 SOA 安全需求的所有安全服务。
Just have one list, either an allow list or deny list depending on what your security requirements are.
应该根据自己的安全需求,只使用允许列表或拒绝列表之一。
A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
Their failure doesn't directly impact the completion of a transaction, and security requirements are minimal.
它们的失败并不会直接影响事务的完成,安全需求最小。
Their failure doesn't directly impact the completion of a transaction, and security requirements are minimal.
它们的失败并不会直接影响事务的完成,安全需求最小。
应用推荐