Provides links to CLR integration security resources.
提供CLR整合安全性资源的连结。
Thus, for those who hold shares of listed corporate enterprises, this is a very good security resources.
因此,对于那些持有上市公司法人股的企业来讲,这是一个很好的担保资源。
In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.
第三部分提出了一种基于P 2 P的安全资源共享以提高P 2 P安全性的设计模型。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
And it provides an extensive wealth of security resources that make implementing those activities reasonable, particularly when also introducing tools to help automate process pieces.
并且他提供了一个广泛的安全资源,介绍工具用以实现自动过程。
Generational tensions are being fueled by continuing debate over Social Security benefits, which mostly involves a transfer of resources from the young to the old.
围绕社会保障福利的持续争论加剧了两代人之间的紧张关系,主要涉及资源从年轻人向老年人的转移。a
What's really needed, critics say, is even tougher laws and more resources aimed at tightening up border security.
批评人士说,为了严控边境安全,真正需要的是更严厉的法律和更多的资源。
Now that you have a security role, you need to assign it to some resources.
现在您拥有了一个安全性角色,您需要给其分配一些资源。
Security controls for most resources are applied based on group membership and user attributes.
对于大多数资源,安全性是根据组成员身份和用户属性应用的。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
Note that defining resources at different scopes has no impact on security.
请注意,在不同的范围内定义资源对安全性并没有影响。
Portal security controls the level of access to all the portal resources, including content.
门户安全性控制所有门户资源(包括内容)的访问级别。
The example will deal with security, which means you'll apply security rules to the REST resources by securing URLs.
这个示例处理安全性问题,这意味着您将通过保护URL把安全规则应用到REST资源。
Security realms are used for securing access to resources.
安全领域用于确保对资源的安全访问。
This allows the resource adapter and application server to share resources and provide services such as security, connection pooling, and transaction management.
这使得资源适配器及应用程序服务器共享资源并提供例如安全、连接池及事务处理这样的服务。
You can define command resource security profiles for application resources, such as application queues, to control which users can define which queues.
可以为应用程序资源(比如应用程序队列)定义命令资源安全性配置文件,以控制哪些用户能定义哪些队列。
For more information about the performance and security benefits of static SQL, see Resources.
要了解更多关于静态SQL在性能和安全性方面的优点,请参阅参考资料。
Another alternative might be to use generic connections for resources and implement certain application-level security.
另一种替代方法可能是对资源使用通用连接,并实现某种应用层安全性。
Banks have thrown a lot of resources at online security.
各家银行在网络安全上投入了大量资源。
Run by small organizations, highly fragmented and with few resources to invest in security, the nation's water supply is an inviting target for attack.
由小型组织维护,高度分散,安全方面毫无资源投入,这个国家的供水设施是攻击的绝好目标。
Use of XSLT is more difficult to set up, especially as modern releases of browsers increasingly place security restrictions (see Resources for a link) on the use of XSLT.
XSLT的使用越来越难以设置,尤其是随着浏览器的现代版本在 XSLT 的使用上放置的安全约束越来越多(参见参考资料中的链接)。
Currently, there are no standardized cloud-specific security metrics that cloud customers can use to monitor the security status of their cloud resources.
目前,还没有这样一种标准化的特定于云计算的安全指标,让云客户可以使用它来监视云资源的安全状态。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
This allows project managers to better control costs, manage security, and allocate resources to clouds a project is assigned to.
这样项目管理人员可以更好地控制成本、管理安全问题和分配资源。
See the security section in the GRUB manual (see Resources) for more information on GRUB security and other aspects of GRUB.
请参阅GRUB手册的安全性部分(参见参考资料),了解关于 GRUB 安全性和其他方面的更多信息。
More information about high availability and security issues is available in the resources section.
有关高可用性和安全问题的更多信息,请参阅“参考资料”部分。
The standard J2EE security model contains a description of roles, which encompasses the security-constrained resources that can be accessed by principals.
标准J2EE安全模型包含角色的描述,包括可由主体访问的受安全机制约束的资源。
Once you understand the concepts of TAMOS, you will be in a better position to provide security to your system resources on top of that provided by the native operating system.
一旦理解了TAMOS的概念,您就能在本机操作系统提供的保护之外为系统资源提供更好的保护。
For more information about the WebSphere Application Server environment configuration in the context of security and thin clients, see Resources at the bottom of the article.
要详细了解安全客户端和瘦客户端上下文中的WebSphereApplicationServer环境配置,请参见本文末尾的参考资料。
For more information about the WebSphere Application Server environment configuration in the context of security and thin clients, see Resources at the bottom of the article.
要详细了解安全客户端和瘦客户端上下文中的WebSphereApplicationServer环境配置,请参见本文末尾的参考资料。
应用推荐