• 应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    Information gathered by social network applications needs to be protected by policies which control access to information.

    youdao

  • 社交网络应用程序不仅应该提供有用的特性保护用户信息不被滥用

    A social network application should not only provide useful features, but also protect people's information from abuse.

    youdao

  • 完成这些配置步骤之后可以配置J2EE安全设施保护应用程序组件

    After these configuration steps are completed, you can configure J2EE security facilities to protect application components.

    youdao

  • 因此除了保护内部应用程序免受攻击外本文建议大多数安全性加强步骤成本相当

    That said, with the exception of protection against internal application attacks, most of the security hardening steps suggested in this article are fairly low cost.

    youdao

  • 通过清理数据忽略被错误提交的数据,已经保护应用程序奠定良好的基础。

    By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.

    youdao

  • 这点非常重要,因为内核用户空间应用程序使用的是不同保护地址空间。

    This is important because the kernel and user application occupy different protected address Spaces.

    youdao

  • 一方面,LotusExpeditor平台保护应用程序数据方面一个安全的平台。

    On the other hand, the Lotus Expeditor platform is a secure platform that protects your application data.

    youdao

  • 恰当地使用Cake可以轻松保护应用程序免遭漏洞攻击。

    Properly used, Cake can make it easy to protect your application from this type of vulnerability.

    youdao

  • 启动WTE服务器然后尝试访问Web应用程序保护资源

    Start your WTE server and then try to access a protected resource in your Web application.

    youdao

  • 在下一部分示例我们SSL用于Web服务演示保护应用程序过程

    In the example in the next section, we will enable SSL for web services to demonstrate the process of securing your application.

    youdao

  • 了 OAuth一个资源所有者可以授权第三应用程序访问保护的资源,而不损害用户证书

    With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.

    youdao

  • 确保保护应用程序的内容没有在运行(例如Firefox或者Evolution)。

    Make sure that the application whose data you want to protect (e.g. Firefox or Evolution) is not running.

    youdao

  • 因此,要保护Web应用程序一步需要添加输入验证

    Therefore, input validation is the first step toward protecting Web applications.

    youdao

  • 如果Web应用程序针对XSS攻击进行保护,则会造成严重的破坏

    If your Web application does not guard against XSS attacks, the only limit to the harm done is the imagination of the attacker.

    youdao

  • 清单4中的粗体显示保护应用程序web. xml代码(代码分发包dd目录中)。

    The bold lines in Listing 4 show the web.xml code (in the dd directory of the code distribution), that protects the application.

    youdao

  • 这种级别保护应用程序允许限制其他应用程序访问系统资源

    This level of protection lets the application allow or restrict other applications to access the system resource.

    youdao

  • 本文描述示例应用程序中,保护业务逻辑ejb使只有通过认证用户可以调用特定的EJB方法

    In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.

    youdao

  • 如果用户试图访问任何保护页面样例应用程序将显示登录页面

    If the user attempts to access any of the protected resources, the sample application presents the login page.

    youdao

  • 所有存储库中的用户将用户和组映射J2EE应用程序中的保护资源

    Users and groups from all repositories are available for mapping users and groups to protected resources within the J2EE applications.

    youdao

  • 使用GSS - API程序编写应用程序可以知道关于保护网络数据细节

    A programmer using GSS-API can write an application that is ignorant of the details of protecting network data.

    youdao

  • 理论上可以相同方法保护MIDP应用程序

    In theory, MIDP applications could be secured by the same methods.

    youdao

  • 策略允许访问任何应用程序可以访问保护文件前提是应用程序使用系统访问文件。

    Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.

    youdao

  • 策略允许访问任何应用程序可以访问保护文件前提是应用程序使用系统访问文件。

    Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.

    youdao

  • 约束角色部署安全保护应用程序确定

    Constraints and roles are fixed when a secured application is deployed.

    youdao

  • 了解这些内容之后,我们转而了解那些受简单登录形式保护示例PHP应用程序

    With that in mind, let's jump into a sample PHP application secured by a simple login form.

    youdao

  • DAO模式可以保护应用程序,使之不必与特定持久性方法捆绑在一起。

    The DAO pattern protects your application from being tied to a particular persistence approach.

    youdao

  • 应用程序文件默认保护的。

    Application files are protected by default.

    youdao

  • 即使不考虑通过由模型驱动开发基于SOA服务管理所提高的效率业务应用程序保护信息

    Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.

    youdao

  • 我们建议应用程序重点放在业务逻辑延迟服务访问保护送往基础设施的消息(承载应用程序的运行时容器)上。

    We recommend that applications focus on business logic and defer securing the service access and the messages to the infrastructure (the runtime container hosting the application).

    youdao

  • 正如已经了解到的一样,Acegi组件彼此依赖,从而对应用程序进行保护

    As you have learned already, Acegi's components are dependent on each other to secure your applications.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定