这场过热但经常中肯的论战的读者们会下结论,最安全的策略是有机食品和一个苍蝇拍。
Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.
sugroup提供一种在系统上实现和管理安全策略的方法。
Sugroups provides one method of implementing and managing the security policy on your systems.
尽管某些安全细节可以作为策略的一部分,但并非所有安全需求都必须成为策略的一部分。
Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.
如果你有很好的密码策略的话,你还能看到用户锁定策略,因此这不是一个很大的安全问题。
If you have good password policies, which also include lockout policies, then it is not that big a security issue.
提出关于这种类型迁移的一种设计策略,它包含并行、同步、存储、灵活、多租赁和安全等概念。
A design strategy for this type of migration, one that includes the concepts of parallelism, synchronization, storage, elasticity, multi-tenancy, and security.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
那个小组的成员对这个系统中的其它记录是一无所知的,除了那些他们安全策略的记录。
Members of that group have no knowledge of any other records in the system, other than those with their security policy.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
A security label belongs to a security policy and contains a value for each security component in that security policy.
安全政策执行的首要策略,更有可能是通过一个约定俗成的过程来开发的。
The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.
如果英国真的想改善其能源安全和环境,解决气候变化问题,那比起低排放交通策略,我们更需要一个低汽车交通策略。
More than a low-carbon vehicle strategy, if the UK is to improve its own energy security and environment, and tackle climate change, we need a low-car vehicle strategy.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
A Content Audit option that determines whether security policy calculation should be done in FM.
请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。
Note that this is an example; you or your security policy might dictate additional parameters than are being used here.
确保系统安全的一个好的策略是拒绝任何操作,而不是允许任何操作。
A good policy for securing your systems is to start by denying everything instead of allowing everything.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
为了就适用于参加协作工作的企业的安全策略、标准和工具达成一致意见。
To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
企业安全策略可能作为一致性维度的一部分,但安全性常常是一个复杂的文化问题。
Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue.
毕竟,在你开始一个可靠的策略之前,你不想放弃一份稳定薪水所带来的安全感。
After all, you don't want to give up the security of a steady paycheck before you have a solid game plan.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
业务策略在同一个时间跨越所有作用范围,如安全性、业务过程、总体架构和操作策略。
Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
A typical process of policy based service security management can be divided into five steps and described as follows.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
例如,收到一个SOAP请求时的策略,这个策略会在SOAP消息头里验证安全信息来确认用户也许可以接受先前缓存的响应数据。
For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.
安全血液促进母亲安全全球行动旨在改善获得安全血液,以处理与妊娠有关的并发症,作为孕产妇保健综合策略的一部分。
The Global Initiative on Safe Blood for Safe Motherhood aims to improve access to safe blood to manage pregnancy-related complications as part of a comprehensive approach to maternal care.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
除了这些基本的配置问题之外。CXF也在WSDL 中支持外部策略引用,对于那些想跨平台标准化安全性策略的组织,这是一个重要的特性。
Beyond the basic configuration issues, CXF also supports external policy references in WSDL, an important feature for organizations that want to standardize security policies across the enterprise.
应用推荐