Multi-factors defined in CC are replaced by MTSF(mean time to security failure) as the metric of vulnerability complexity.
把CC评估标准定义的多个变量映射为以平均安全时间为参数的度量指标。
Americans are willing to tolerate time-consuming security procedures in return for increased safety.
美国人愿意忍受耗时的安全程序,来换取更高的安全性。
Wasn't your decision to trade off programmer efficiency, security, and software reliability for run time performance a fundamental mistake?
你在为运行时性能权衡编程效率、安全、软件可靠性而做出的决定是否是一个根本错误?
With your team gathered and your new SOA developed, now is the time to test its security.
在召集团队并开发新的SOA以后,现在是测试其安全性的时候了。
Use SOAP header blocks to exchange security tokens and to carry time stamps of messages.
使用soap头信息来交换安全性令牌和携带消息的时间戳。
Most of the time, though, it pays to elevate your gaze a bit and think about security at the application architecture level.
不过大多数时候,如果能将所关注的内容提升一下,考虑应用程序架构级别的安全性,将颇有裨益。
In this column we've introduced you to buffer overflows, which are probably the worst software security problem of all time.
在本专栏中,介绍了缓冲区溢位,它永远可能是最糟的软体安全性问题。
It is time to go to the UN Security Council and try sanctions.
该是安理会和制裁发挥作用的时候了。
If most administrators spent the time to put OpenBSD's default security measures in place on any other distribution, they would likely change their line of thinking.
如果大多数管理员愿意花时间使用OpenBSD的缺省安全措施来替代任何其他的分发版,那么他们很可能会改变其思维方式。
If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.
如果您曾经从事过计算机安全方面的工作,则应该习惯于关于任何应用程序的以下类型的问题。
Now it's time to use the security controls that are available in ASP.NET 2.0.
现在是使用ASP.NET2.0中安全控件的时候了。
I intend to devote more time to the topic of security in a future installment of this column, when hopefully progress on the security standards front has progressed.
我打算在此栏目的今后部分中投入更多时间讨论安全性的话题,到时希望在安全标准方面有所进展。
The roles are mapped to real users and groups at application deployment time, during a process called security role mapping.
角色将在应用程序部署时映射到实际的用户和组(在称为安全角色映射 的过程期间进行)。
Devices have become security blankets. Take the time to wean yourself.
设备已经成了人们生活的保障。要花时间去戒掉。
Instead your time can be dedicated to designing security policies, category trees, and the system labels.
相反,你的时间可以用来设计安全策略,目录树,以及系统标签。
Users can only be mapped to the security identity at deployment time, using the Administration console.
用户只能在部署时使用管理控制台映射到安全标识。
For the first time, we have a proper plan to build security capability for the Palestinians, which is necessary to create a Palestinian state.
我们还第一次拥有一项为巴勒斯坦人培养安全力量的恰当计划,而这是建立巴勒斯坦国所必须的。
Now it's time to confront that elephant in the corner: security.
现在是面对被甩在一边的重要问题——安全性——的时候了。
As security exits are only invoked at channel startup time, security exits are ideal for performing functions that only need to be done once.
由于仅在通道启动时调用安全出口,安全出口对于执行只需执行一次的功能非常理想。
It's time you wised up to the harsh reality that job security doesn't exist.
工作保障并不存在,现在是时候认识到这一严酷的现实了。
Is it possible to reinvent JSON but this time without the security problems and with the enhanced flexibility XML enables?
是否有可能重现JSON的案例,但这一次不再存在安全性问题,而且提供XML支持的一些增强的灵活性?
The proliferation of identities demands a better identity management solution, not only to ease the burden on it administrators' time to manage them but also to address security and privacy concerns.
身份的滋生要求一个更好的身份管理方案,不只是减少IT管理员花在管理身份上的工时,还要解决安全和隐私隐患。
Crafting a security policy requires planning ahead of time to resolve the issues on how purpose, scope, and background of the policy should be stated.
制定安全策略需要提前进行计划,解决应该如何声明策略的用途、范围和背景的问题。
For example, a person who highly values financial security yet devotes a great deal of time to shopping and running up debts will usually find herself stressed, joylous, and sometimes sick.
举个例子来说,一个将个人财务稳定看的很重却花大把的时间来购物以至自己陷入债务的人通常会觉得自己很有压力,不快乐甚至是心烦意乱。
I've got time to get a security pass, but no time to find a place to sleep?
我连找个地方先睡一觉的时间都没有,现在倒有时间等着拿安检通行证?
The problem has changed very little over the past 20 years. It’s time for everyone to take password security seriously; it’s an important first step in data security.
这个问题在过去20年都没什么变化,现在是人们应该认真对待密码的时候了,这是数据安全的第一步。
Audit logging is usually used in security-sensitive environments where changes made to the portal's run time configuration are recorded.
审计日志通常在安全敏感的环境中使用,其中记录对门户运行时配置的更改。
Audit logging is usually used in security-sensitive environments where changes made to the portal's run time configuration are recorded.
审计日志通常在安全敏感的环境中使用,其中记录对门户运行时配置的更改。
应用推荐