似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
通过支持用户名和密码认证以及数字证书的数据安全。
Data security by providing support for username and password authentication and for digital certificates.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Double key secure authentication is one of the protection methods used to verify access across different systems.
声明说,通用动力公司也将执行质量保证,并支持软件的认证和安全的政策和程序方面的问题。
General Dynamics will also perform quality assurance and support the development of policy and procedures such as software certification and safety, the announcement said.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
除了上面列出的服务,ESB通常还要包括记日志、审计、认证(安全)和管理等机制。
Typically an ESB will contain mechanisms for logging, auditing, authentication (security), and management, etc, above and beyond the services listed above.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
通过信任和认证的安全软件:你的手机将提供工具和信息,使你可以自主决定下载什么,看到什么,分享什么。
Safer software through trust and verification: Your phone will provide tools and information to empower you to decide what to download, what to see, and what to share.
增强认证支持,对建立安全的远程会话和用户认证提供了更强大的处理能力。
Enhanced authentication support that provides stronger processes for establishing secure remote sessions and authenticating users.
其它方法使用中央认证中心来发放证书,这些证书保证了网络中从一点到另一点的安全通信。
Other approaches use a central certificate authority to issue certificates that guarantee secure communication from one point to another within a network.
相反,如果应用程序依靠HTTP消息头中额外信息保证安全,您应该采用相互ssl认证。
On the other hand, if the application is relying on additional information in the HTTP headers for security purposes, you should use mutual SSL authentication.
DCE通过一个认证RPC机制在客户机和服务器之间提供了一个安全的通信通道。
DCE provides a secure communication channel between a client and a server through an authenticated RPC mechanism.
浏览器显示一个警告,表明安全证书没有经过可信权威认证,与实际网站不匹配。
The browser shows a warning that the security certificate was not certified by a trusted authority and not matching the actual website.
当用户访问这样的网址,他们依赖认证权威(CA),这是数百个公司签署的证书来保证安全浏览。
When a user visits such sites, they are relying upon certificate Authorities (CAs), hundreds of companies that sign the certificates that supposedly guarantee secure browsing.
参数值包括用于COM和DCOM安全级别的认证;可用命名管道数量和IIS进程ID。
Among the values passed are the required authentication level for COM and DCOM security, the number of named pipes available for use, and the IIS process ID.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
其安全模型与本地模型完全兼容,但限制于标准的SQL认证与登录上。
The security model is 100% compatible with on-premise model but is limited to standard SQL authentication and logins.
虽然多数安全框架止于授权和认证,但Shiro提供了更多功能。
And while most security frameworks stop at authentication and authorization, Shiro provides much more.
CISSP(信息系统安全认证专家)。
CISSP (Certified Information Systems Security Professional).
SSL客户端认证:这是最安全的,但是对购物者来说在浏览器上安装认证是比较麻烦的。
SSL client side authentication: This is the most secure, but it is cumbersome for shoppers to install on their browsers.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
跨会话识别用户的惟一一种最安全的方案是使用基于用户名和密码的标准身份认证方法。
The only secure way to identify users across sessions is to use standard authentication methods based on user names and passwords.
应用程序需要一个安全性部署计划,指定从哪个源获得认证用户所需要的用户名和口令信息。
Your application needs a security deployment plan that specifies what the source is for obtaining username and password information for authenticating users.
传输器基于用户名密码组合认证一个输入请求,然后再将认证和审计委托给安全服务。
Transports authenticate an incoming request based on a user-name password combination and then delegate authorization and auditing to a security service.
如果我们忽略软件错误,认证问题可能是最普遍类型的安全性问题,这意味着选择一个合理的认证技术很重要。
Authentication problems are probably the most pervasive class of security problems if we ignore software bugs, meaning that choosing a reasonable authentication technology is important.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
生物认证供应商经常忽略的另一个问题是输入机制的安全性。
Another problem that biometrics vendors often overlook is the security of the input mechanism.
控制方面的课题有:安全审计不足的可能,以及认证方式和安全度量在云计算中没有得到采用这样一个事实。
Among the control challenges are insufficient security audit possibilities, and the fact that certification schemes and security metrics aren't adopted to cloud computing.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
应用推荐