概括起来,USB端口锁定是有点远不是同类专业的安全应用程序。
To sum it up, USB Port Locked is a bit far from being a professional security application of its kind.
这个错误通常由基本连接失败引起,例如试图对安全应用程序服务器进行不安全的连接。
This error is usually caused by a basic connection failure, such as attempting to make a non-secured connection with a secure application server.
但在第三方库和供应商支持的帮助下,我们发现可以用MIDP 1.0来实现安全应用程序。
But with the help of third-party libraries and vendor support, we have found that we can use MIDP 1.0 to implement secure applications.
在结束部分,我们将总结使用J2ME技术开发用于最小型无线设备的高级安全应用程序的可行性。
In closing, we'll summarize the feasibility of developing advanced secure applications for the smallest wireless devices using J2ME technologies.
GSSAPI提供了一个标准的通用接口,通过该接口安全应用程序可以使用多种底层的安全机制。
GSSAPI offers a standard generic interface through which a secure application can use multiple underlying security mechanisms.
最后,在实现安全解决方案时,应该考虑安全工程——用于构建安全应用程序的工程方法。
Lastly, when implementing any secure solutions, one should consider security engineering — an engineering methodology to build secure applications.
通过使用这些GSS - API接口,可以实现使用Kerberos机制的安全应用程序和系统。
Using these GSS-API interfaces, you can implement secure Keberized applications and systems.
术语“WS - Security”通常指处理加密和数字签名的一组规范,支持您创建安全应用程序。
The term "WS-Security" is usually used to refer to a group of specifications that handle encryption and digital signatures, enabling you to create a secure application.
因此,用GSS - API开发的安全应用程序可以在不同的安全机制上运行,不用改变应用程序。
Thus, a secure application developed using GSS-API can work over different security mechanisms without changes to the application.
GSSAPI的主要的优点是:一个使用GSSAPI开发的安全应用程序无需修改就可以在不同的安全机制上工作。
The main benefit of GSSAPI is that a secure application developed using GSSAPI can work over different security mechanisms without modification.
令人惊讶的是,直到最近安全和IT专业人员才开始认识到,安全应用程序对于提高企业抵抗攻击的能力是必不可少的。
Surprisingly, only recently have security and it professionals begun to realize that secure applications are mandatory when hardening a company's resistance to attacks.
另外,在企业上下文中,您可以围绕实现外部安全应用程序(如TivoliAccess Manager)设计体系结构。
Also, in an enterprise context, you might design the architecture around implementing an external security application, such as Tivoli Access Manager.
在开发安全应用程序时遇到的最大问题之一是安全通常是事后的补救办法,即在项目的代码完成后才想起需要实现某些内容。
One of the biggest problems in developing secure applications is that security is often an afterthought, something to implement after a project is code-complete.
我发现,如果把追踪应用程序作为家庭公认的提高安全性的工具,而不是作为一个用于监视的秘密工具,那么青少年会更容易接受它。
I've found teens are more acceptable to tracking app when it is included as part of a family agreement to improve safety than when it is placed as a secret tool to watch them.
例如,考虑一个包含许多聊天室的安全聊天应用程序,其中每个聊天室都有几个人。
For example, think of a secure chat application containing a number of chat rooms with several people in each room.
建立安全连接的应用程序称为上下文发起者。
The application that establishes the secure connection is called the context initiator.
与SQL注入攻击类似,如果使用最佳实践开发安全的应用程序,通常可以轻松地处理该威胁。
Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.
在本文中,您了解了如何配置环境,以便使用DES身份验证运行安全RPC应用程序。
In this article, you learned how to configure the environment for running Secure RPC applications using DES authentication.
还有部署模式、安全模式、应用程序模式以及处理操作和运行时问题的模式。
There are deployment patterns, security patterns, application patterns, and patterns that deal with operational and runtime aspects.
很多应用程序本身没有问题,但是存在潜在的安全漏洞,比如这种应用程序所使用的某个端口或协议存在漏洞。
There are lots of applications that aren't troublesome in themselves, but have potential security holes, like when a port or protocol used normally by that app has vulnerabilities.
仔细考虑用户输入的位置及正确值将使您可以构建一个健壮、安全的应用程序。
Carefully considering where your user input is going and what it should be will allow you to build a robust, secure application.
该配置仍然安全,因为应用程序CMPEJB只提供了本地接口,因此只能从同一ejb容器中访问。
This configuration is still secure, because application CMP EJBs provide only local interfaces and, therefore, can only be accessed from the same EJB container.
能够快速和安全的修改应用程序来满足紧急的业务需求。
You must be able to change the application quickly and safely to meet emergent business requirements.
也没有影响安全或限制应用程序和语言的类型。
Neither has it impacted security or restricted the types of applications and languages that can make use of it.
创建安全的应用程序连接性体系结构。
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
通过使用以下安全模型,您将拥有合适的工具来创建具有安全性的安全的应用程序,而且使用此应用程序的用户不会感觉麻烦。
By using the following security model, you will have the right tools in your belt to create a safe application with security in place that isn't cumbersome for users.
如果前面没有首先部署应用程序的安全性部署计划,应用程序在这里会部署失败。
If you did not first deploy your application's security deployment plan previously, your application will fail to deploy here.
但是,我认为更好的做法是,了解如何在任何情况下都能开发安全的应用程序,并随后注意何时应用特定的指导原则。
Instead, I think it's better to learn how to develop secure applications in any situation, and then note when specific guidelines apply.
通常,将这种类型的安全领域称为应用程序范围的安全领域。
This type of security realm is generally referred to as an Application Scoped security realm.
应用推荐