应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
社交网络应用程序不仅应该提供有用的特性,还应保护用户的信息不被滥用。
A social network application should not only provide useful features, but also protect people's information from abuse.
完成这些配置步骤之后,可以配置J2EE安全设施来保护应用程序组件。
After these configuration steps are completed, you can configure J2EE security facilities to protect application components.
因此,除了保护内部应用程序免受攻击外,本文中建议的大多数安全性加强步骤的成本都相当低。
That said, with the exception of protection against internal application attacks, most of the security hardening steps suggested in this article are fairly low cost.
通过清理数据并忽略被错误提交的数据,已经为保护应用程序奠定了良好的基础。
By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.
这点非常重要,因为内核和用户空间的应用程序使用的是不同的保护地址空间。
This is important because the kernel and user application occupy different protected address Spaces.
另一方面,LotusExpeditor平台在保护应用程序数据方面是一个安全的平台。
On the other hand, the Lotus Expeditor platform is a secure platform that protects your application data.
恰当地使用,Cake可以轻松地保护您的应用程序免遭这类漏洞攻击。
Properly used, Cake can make it easy to protect your application from this type of vulnerability.
启动WTE服务器然后尝试访问Web应用程序中被保护的资源。
Start your WTE server and then try to access a protected resource in your Web application.
在下一部分的示例中,我们将把SSL用于Web服务,以演示保护应用程序的过程。
In the example in the next section, we will enable SSL for web services to demonstrate the process of securing your application.
有了 OAuth,一个资源所有者可以授权第三方应用程序访问受保护的资源,而不损害用户证书。
With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.
确保你要保护的应用程序的内容没有在运行(例如Firefox或者Evolution)。
Make sure that the application whose data you want to protect (e.g. Firefox or Evolution) is not running.
因此,要保护Web应用程序,第一步需要添加输入验证。
Therefore, input validation is the first step toward protecting Web applications.
如果您的Web应用程序不针对XSS攻击进行保护,则会造成严重的破坏。
If your Web application does not guard against XSS attacks, the only limit to the harm done is the imagination of the attacker.
清单4中的粗体行显示了保护应用程序的web. xml代码(在代码分发包的dd目录中)。
The bold lines in Listing 4 show the web.xml code (in the dd directory of the code distribution), that protects the application.
这种级别的保护让应用程序允许或限制其他应用程序访问系统资源。
This level of protection lets the application allow or restrict other applications to access the system resource.
在本文描述的示例应用程序中,保护业务逻辑ejb,以使只有通过认证的用户可以调用特定的EJB方法。
In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.
如果用户试图访问任何受保护的页面,样例应用程序将显示登录页面。
If the user attempts to access any of the protected resources, the sample application presents the login page.
所有存储库中的用户和组均可将用户和组映射到J2EE应用程序中的受保护资源。
Users and groups from all repositories are available for mapping users and groups to protected resources within the J2EE applications.
使用GSS - API的程序员编写的应用程序可以不知道关于保护网络数据的细节。
A programmer using GSS-API can write an application that is ignorant of the details of protecting network data.
理论上,也可以用相同的方法保护MIDP应用程序。
In theory, MIDP applications could be secured by the same methods.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.
约束和角色在部署受安全保护的应用程序时确定。
Constraints and roles are fixed when a secured application is deployed.
了解这些内容之后,让我们转而了解那些受简单登录形式保护的示例PHP应用程序。
With that in mind, let's jump into a sample PHP application secured by a simple login form.
DAO模式可以保护应用程序,使之不必与特定持久性方法捆绑在一起。
The DAO pattern protects your application from being tied to a particular persistence approach.
应用程序文件默认是受保护的。
即使不考虑通过由模型驱动的开发和基于SOA的服务管理所提高的效率,业务应用程序仍须保护信息。
Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.
我们建议将应用程序的重点放在业务逻辑、延迟服务访问的保护和送往基础设施的消息(承载应用程序的运行时容器)上。
We recommend that applications focus on business logic and defer securing the service access and the messages to the infrastructure (the runtime container hosting the application).
正如您已经了解到的一样,Acegi的组件彼此依赖,从而对您的应用程序进行保护。
As you have learned already, Acegi's components are dependent on each other to secure your applications.
应用推荐