• 这场过热经常中肯论战读者下结论安全策略有机食品一个苍蝇拍

    Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.

    youdao

  • 如果安全策略要求则对请求进行解密

    Decrypt the request if the security policies dictate it.

    youdao

  • 如果安全策略要求对请求进行加密

    Encrypt the request if the security policies dictate it.

    youdao

  • 此外功能声明说明安全策略以便多种服务可以参与安全事务通信

    Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.

    youdao

  • 首先可以使用约束增强阀值策略安全处理。

    First, you can use constraints to enhance security posture to threshold policies.

    youdao

  • 需要威胁检测规则执行安全策略

    Threat detection rules and security policy enforcement are needed.

    youdao

  • 安全策略主要关注用户管理数据保护虚拟保护。

    A cloud security policy focuses on managing users, protecting data, and securing virtual machines.

    youdao

  • 5安全策略提供访问权限角色定义允许操作

    Figure 5: Security Polices provide access, and Roles define Allowed Actions.

    youdao

  • STS安全配置安全对话令牌策略定义中。

    The STS security configuration is nested inside the policy definition of the secure conversation token.

    youdao

  • 提供了通过策略实现的服务安全访问控制

    Secure access control for services using policies is also provided.

    youdao

  • 遵守安全策略条款条件处罚

    Security penalties for not complying with all of the security policy's terms and conditions.

    youdao

  • 所需全部安全执行策略

    the set of required security enforcement policies

    youdao

  • 尽管某些安全细节可以作为策略一部分但并非所有安全需求必须成为策略的一部分。

    Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.

    youdao

  • 如果用户拥有安全策略使用每个规则豁免权那么用户拥有受那个安全策略保护所有数据完全访问权。

    If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.

    youdao

  • 如果很好的密码策略的话,你能看到用户锁定策略,因此不是一个很大安全问题

    If you have good password policies, which also include lockout policies, then it is not that big a security issue.

    youdao

  • 安全标签归属于一个安全策略并且安全策略中的每个安全组件包含一个值。

    A security label belongs to a security policy and contains a value for each security component in that security policy.

    youdao

  • 使安全管理员能够通过启用几个策略组合出复杂公开效果同时保持各个策略简单直观

    This allows the security administrator to compose more complex disclosure effects by enabling several policies, while each individual policy is relatively simple and intuitive.

    youdao

  • 这个策略范围包括了隐私策略规则安全策略和规则、交易实施规则。

    The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.

    youdao

  • SCA提供定义诸如安全类型以及SLA策略能力,这些策略能够应用系统使用。

    SCA provides the ability to define policy sets such as types of security and SLAs that can be reused across applications.

    youdao

  • 所有SOA安全核心基于策略基础设施策略管理

    At the core of all SOA security is a policy-based infrastructure and management of the policies.

    youdao

  • 本文并不讨论如何保护 AIX如何实现安全策略而是讨论密码策略相关的应该注意属性

    This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.

    youdao

  • SECLABEL_BY_NAME:函数通过指定安全策略这个安全策略一个安全标签名称构建一个安全标签(内部编码表示)。

    SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.

    youdao

  • 管理员能够定于安全策略授权项目经理选择对于他们项目最好安全策略

    Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.

    youdao

  • 制定安全策略需要提前进行计划,解决应该如何声明策略用途范围背景问题

    Crafting a security policy requires planning ahead of time to resolve the issues on how purpose, scope, and background of the policy should be stated.

    youdao

  • 安全配置向导允许创建基于XML安全策略它们可以应用服务器上

    The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.

    youdao

  • RFIDIC定义所有安全策略都具有allow语义这意味着策略定义哪些数据可以公开的。

    ALL security policies defined with RFIDIC have ALLOW semantics, meaning, the policies define what data can be disclosed.

    youdao

  • 安全策略边界内,指定由提供商托管由使用者租用预订服务类型应用策略以及应用安全策略方式

    Within its boundaries, specify which cloud service type the provider hosts and the consumers rents and subscribe, what threshold policies are applied, and how the security policy is applied.

    youdao

  • 访问控制使系统能够识别用户安全策略

    Access control. Enables the system to recognize security policies for groups of users.

    youdao

  • 业务策略同一个时间跨越所有作用范围安全、业务过程总体架构操作策略

    Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.

    youdao

  • 创建安全策略安全管理员创建安全标签,安全标签也是安全策略一部分。

    After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定