This release makes dramatic improvements in the areas of default security, ease of use, and security function.
这个版本在缺省安全性、易用性和安全功能方面进行了大幅度的改进。
This can be a security issue. So if you are concerned with security, this is not for you.
这个一个安全问题,所以如果你很关心安全问题的话,这种方法不适合你。
With this security architecture, you can impose security at the document level.
使用这个安全性体系结构,您可以将安全性强制在文档级别。
I intend to devote more time to the topic of security in a future installment of this column, when hopefully progress on the security standards front has progressed.
我打算在此栏目的今后部分中投入更多时间讨论安全性的话题,到时希望在安全标准方面有所进展。
The security on this object is inherited from all case type instances using a partial security proxy.
所有案例类型实例使用一个部分安全代理继承这个对象中的安全设置。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
This type of security realm is generally referred to as an Application Scoped security realm.
通常,将这种类型的安全领域称为应用程序范围的安全领域。
This article provided you with an overview of security plug-ins, starting with the benefits of security plug-ins and their advantages over standard security facilities.
本文对安全性插件进行了概述,首先提到了安全性插件的优点,以及安全性插件与标准安全性设施相比的优势。
Since complexity is the enemy of security, there is also a limit to how much security can be attained this way.
由于复杂性是安全性的“敌人”,这种方法可以实现的安全性也是有限的。
As we noted earlier, this abstraction layer also complicates the use of advanced security controls, such as hardware security modules, possibly leading to poor key management procedures.
我们前面也提到了,这个抽象层还让先进的安全控制——像是硬件安全模块——的使用更加复杂,结果就可能是蹩脚的密钥管理程序。
This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.
此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。
What neither SAML nor XACML provide is an infrastructure to deliver and manage security services; it is up to the enterprise security vendor to provide this.
SAML和XACML 都没有提供用于交付和管理安全服务的基础设施;需由企业安全供应商提供此基础设施。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
Along with this database, the te implements security policies that add another level to system security.
除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。
This information includes the principal's identities, public security credentials, and private security credentials.
该信息包含主体的身份、公共的安全凭证和私有的安全凭证。
SECLABEL_BY_COMP: This function builds a security label (internal encoded representation) by specifying a security policy and values for each of the components in the label.
SECLABEL_BY_COMP:该函数通过指定一个安全策略,并在标签中为每个组件指定值,从而构建一个安全标签(内部编码表示)。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.
本系列的第2部分主要关注DB 2安全性插件,这是实现DB 2安全性的新方法。
Essentially, security administrators can code to the GSS-API and implement virtually any supported security mechanism that supports this interface.
本质上是,安全管理员可以对于GSS -API进行编码,并真正实现支持该接口的、受支持的安全机制。
It has a security Rule, issued in 2003, which comprises of the security standards to be followed by this industry.
其中包含了2003年颁布的安全规则,医疗行业必须遵守这些安全标准。
Go to the Security tab and enable security for this server.
转到Security标签,使得该服务器的安全性可用。
This security problem, known as instance level security, it's very hard to solve because within a web application there are thousands of similar request that need to be validated.
这种安全问题,被认为是实例级别的安全,它非常难以解决。因为,在一个Web应用中,有成千上万条相似的请求需要被验证。
Without enablement of this message flow security, the default security facilities in WebSphere message Broker are based on the security provided by the transport mechanism.
如果没有启用这种消息流安全性,WebSphereBroker中的默认安全性工具将基于传输机制所提供的安全性。
Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.
虽然这种方法在端对端通信链路中提供了适当的安全性,但违反了图书销售商的安全性策略。
Because the hr cube in the existing security model does not collide with a cube in the incoming security model, the security metadata associated with this cube remains in the resulting security model.
因为现有安全模型中的hr多维数据集没有和导入安全模型中的任何多维数据集冲突,与该多维数据集关联的安全元数据保留在生成的安全模型中。
This reality has led Janet Napolitano, the secretary of Homeland Security, to conclude that “homeland security begins with hometown security.”
这个事实让国土安全部(HomelandSecurity)的秘书JanetNapolitano总结到“国土安全始于家乡安全”。
This was designed stupidly," said Bruce Schneier, a security expert who is also the chief security technology officer at British Telecom.
设计得实在太差,”BruceSchneier说。 Bruce Schnerier是英国电信的安全技术首席经理,同时他自己也是个安全专家。
This call includes the source security identifier (sid), the security class (constructed from the details of the requested operation), the particular socket call, and optional auxiliary audit data.
此调用包括源安全标识符(sid)、安全类(根据请求操作的详细信息构造)、特定socket调用,以及可选的辅助审计数据。
For this example, disable bus security by navigating to MyBus resource and clicking on security.
对于此示例,请导航到MyBus资源并单击Security,以禁用总线安全性。
For this example, disable bus security by navigating to MyBus resource and clicking on security.
对于此示例,请导航到MyBus资源并单击Security,以禁用总线安全性。
应用推荐