Things like communication protocol differences, routing and auditing of interactions, security, and so on, can be handled outside of the actual service requester and provider.
像通信协议差异、路由和审核交互、安全性之类的内容可以在实际的服务请求程序和提供程序之外处理。
Typically an ESB will contain mechanisms for logging, auditing, authentication (security), and management, etc, above and beyond the services listed above.
除了上面列出的服务,ESB通常还要包括记日志、审计、认证(安全)和管理等机制。
Regular system auditing will also help refine the security policy used for new machine installations as it helps close the feedback loop on what subsystems are actually in use.
正常的系统审计也可以帮助提炼安装新机器时所使用的安全策略,因为它有助于关闭关于实际使用的子系统的反馈循环。
The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
The auditing side of cyber security needs candidates who might not be able to write security programs but can understand how to regulate activity.
比如网络安全的审计方面需要的人手可能不必懂编程,但却要知道如何进行规范管理。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
Attributes like threading, instancing, auditing, security and hosting are important regardless of the protocol.
类似线程、实例化、审计、安全与托管等重要特性都不需要考虑协议。
Many security implementations make the fundamental assumption that the user interacting with it is a real user (think about auditing, and so on).
许多安全实现都进行一个基本假定,即与其进行交互的用户是一位真实用户(考虑到审核等)。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
The Enterprise edition adds more security through advanced auditing and transparent data encryption, and data warehousing with ColumnStore, compression, and partitioning.
企业版通过高级审计和透明数据加密功能为其增加了更高的安全性,还添加了拥有ColumnStore的数据仓库、压缩、以及分区。
It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.
它也可以报告对服务器的未授权的访问尝试,因此它对于审核LotusDomino服务器的安全性是一个有用的工具。
The authors start by providing a thorough introduction to the WS-Security standards and discuss important topics such as auditing, authorization and user identity propagation.
作者从详细介绍WS - Security标准入手,讨论了审计、授权和用户身份传播等重要话题。
Another security enhancement is the option to generate security auditing records of WebSphere Application Server administrative actions.
另一个安全增强功能是可以选择生成WebSphereApplicationServer管理操作的安全审核记录。
This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.
要实现这个目标,需要获得个人账户的对象,再加上安全规则及审计方面的要求。
The auditing feature enables you to configure a security realm that logs all login attempts to a file.
审核特性允许您配置一个安全领域,以便将所有登录尝试记录到一个文件中。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The DB2 UDB auditing facility is an important security tool in the DBA's toolbox.
DB 2UDB审计功能是DBA工具箱中一件重要的安全性工具。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices.
网络安全专家克里斯·杰克逊从一个全面的概述的审计过程,包括最新的法规,覆盖合规问题,和行业最佳实践。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
Network security auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions.
网络安全审计深入覆盖了商业和开源工具的使用,以协助审计和验证安全策略的假设。
The most that any tool can give you is a snapshot in time, and for a tool to be useful you will need to make security auditing part of normal network maintenance.
任何工具可以给予你的最多是及时的瞬态情况,为了使工具有用,你需要使安全审计成为正常的网络维护工作的一部分。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
According to current research status, auditing system need to be improved in four aspects: the effect to kernel, auditing content, security of audit and the management of auditing record files.
综合现在的研究状况来看,现有的审计系统主要有四个方面需要改进:审计系统对内核的影响、审计的内容、审计的安全、审计记录文件的处理。
Enable security auditing and logging for the database you are using so that you are alerted to any security breaches.
为您使用的数据库启用安全审核和记录,以便违反任何安全性时得到警报。
Obviously, when analyzing the demand and supply issues of audit quality relating to security auditing market in China, we should take the former background as starting point.
显然,对我国证券审计市场相关的审计质量的需求和供给等问题的分析也应当以此为出发点。
And the system also provides certain support for the auditing function of security Log.
系统对安全日志审核功能也提供了一定的支持。
This article mainly discussed AIUAP1.0 — the account, authentication, authorization and auditing platform of AsiaInfo company, which is a concrete implementation of 4a security system at AsiaInfo.
本文的讨论对象是亚信统一帐号、认证、授权和审计平台(aiuap1.0),是亚信公司对于4A安全系统的具体实现。
This article mainly discussed AIUAP1.0 — the account, authentication, authorization and auditing platform of AsiaInfo company, which is a concrete implementation of 4a security system at AsiaInfo.
本文的讨论对象是亚信统一帐号、认证、授权和审计平台(aiuap1.0),是亚信公司对于4A安全系统的具体实现。
应用推荐