拥护者认为开放源代码软件更安全,购买价格及维修成本也更为低廉,并且更容易定制。
Supporters say open source software is more secure, cheaper to buy and maintain and easier to customize.
你在为运行时性能权衡编程效率、安全、软件可靠性而做出的决定是否是一个根本错误?
Wasn't your decision to trade off programmer efficiency, security, and software reliability for run time performance a fundamental mistake?
正如苹果公司和几位安全专家所主张的,强迫苹果公司编写软件来让联邦调查局访问某 iPhone的指令,将树立起一个令人不安的先例。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the FBI access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的那样,强迫苹果公司编写软件来让联邦调查局访问某iPhone 的指令,将树立起一个令人不安的先例。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the F.B.I. access to the iPhone in question would establish an unsettling precedent.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
如果您了解了那些是什么错误-以及如何避免这样的错误-您的软件就会安全得多。
If you learn what those mistakes are — and how to avoid them — your software will be far more secure.
这包括为了安全目的所做的软件升级以及修改过的内容。
This includes software upgrades for security purposes, as well as content that changes.
它们必须设计和实现能够满足这些严格的安全需求的软件解决方案和应用程序。
They have to design and implement software solutions and applications that meet these tight security requirements.
在一个安全存储库内维护配置项,就是软件配置管理的一个主要任务。
Maintaining configuration items within a secure repository is one of the main tasks of software configuration management.
客户在硬件、软件购买和升级、支持人员、电力、安全设备和管理上节省了开支。
Savings. The customer saves on hardware, software purchase and updates, support staff, power, security devices, and administration.
它将从软件工程的角度观察样式表,并展示如何使之更加健壮和安全。
It looks at stylesheets from a software engineering point of view and shows how to make them more robust and secure.
笔者已经详细的了解了西门子软件的安全漏洞在哪里。
Its authors had detailed knowledge of Siemens' software and its security weaknesses.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
这个列表是SANS学院、 MITRE以及“美国和欧洲很多顶级软件安全专家”共同合作的成果。
The list is the result of collaboration between the SANS Institute, MITRE, and “ many top software security experts in the US and Europe”.
安全软件能使远程计算机被“锁定”,以免考生开启未经批准的窗口。
Remote computers are "locked down" with security software, to prevent unauthorised Windows from being opened.
包括安全的管理软件变更和资产工具的平台,对整体开发周期提供可跟踪性。
The platform includes tools for securely managing software changes and assets, providing traceability throughout the development lifecycle.
许多企业不幸地依赖于不安全、不可靠以及脆弱的软件。
Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile.
因此,开源模式常常创建更高质量、更安全、更易于集成的软件。
As a result, the open source model often builds higher quality, more secure, more easily integrated software.
萨维奇说:“我们开发这套复制软件系统是为了向人们证明钥匙本身并非就是安全的。”
"We built our key duplication software system to show people that their keys are not inherently secret," Savage said.
内置的软件甚至使人们能通过网络界面访问到安全录像。
Included software tools make it possible to even access the security footage using a Web interface.
因此,对于依赖安全性的软件或应用程序,审计设施是必不可少的。
So having a facility for auditing is kind of a must for a security-based software or applications.
如今的公司电脑搭载了大量管理、备份和安全软件,速度甚至要比蜗牛还慢。
Many of today's corporate PCs are saddled with management, backup, and security agents that can bog down a PC.
插图软件安全性依然是热点话题。
因此您需要维护在其中托管了软件以及任何系统备份的系统的物理安全性。
So you need to maintain physical security of the system hosting the software and any backups to that system.
“坚固软件宣言”要想成功,就需要得到软件开发社区的支持,仅有应用安全社区的支持是不够的。
For the Rugged Manifesto to succeed, it would need support from the software development community and not just from the application security community.
确保升级网站服务器和应用软件,使用应用安全软件,要求安全性高的密码等等。
Be sure to keep up with web server and application software updates, use applicable security software, require strong passwords, etc.
作者接下来提出了关于违反安全的一个例子,使用传统的推理把软件安全比作成家庭安全。
The authors then offer an example of security violation, using a traditional analogy that likens software security to home security.
网络管理软件可以方便地利用跨网络动态且安全地装入类的能力。
The ability to dynamically and securely load classes across the network can be readily leveraged by network management software.
除了DB 2内置的安全功能之外,软件体系结构还包含文档和元数据处理器,它与安全服务集成。
Besides built-in DB2 security capabilities, the software architecture includes a document and metadata handler that is integrated with a security service.
除了DB 2内置的安全功能之外,软件体系结构还包含文档和元数据处理器,它与安全服务集成。
Besides built-in DB2 security capabilities, the software architecture includes a document and metadata handler that is integrated with a security service.
应用推荐