这种做法通常会导致应用程序的安全性或可伸缩性降低。
Doing so typically causes an application to become either less secure or less scalable.
单靠撰写预存程序并不能够确保应用程序的安全性。
Simply writing stored procedures isn't enough to adequately secure your application.
这个命令把应用程序的安全性部署计划部署到Geronimo。
This command deploys your application's security deployment plan to Geronimo. Geronimo indicates a successful deployment by outputting.
您还创建了属性文件域,并使用该域配置了Web应用程序的安全性。
You also created a properties file realm and configured a Web application's security using that realm.
有两类攻击可能会威胁应用程序的安全性:静态威胁和动态威胁。
Applications can be vulnerable to two kinds of security threats: dynamic and static.
在连接字串内储存机密资讯(如密码)会影响应用程序的安全性。
Storing sensitive information (such as the password) within the connection string can affect the security of your application.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Database-level security measures including authentication and authorization might also be used to enhance application security.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
本系列的后续文章将谈到定制和配置应用程序的安全性,这有很多不同的方式。
The many different ways you can customize and configure the security aspects of the application will be covered in subsequent parts of this series.
您还应该了解一些事情,然后才可以把文档和应用程序的安全性托付给XKMS服务。
You should be aware of few things before you entrust the security of your documents and applications to the XKMS service.
如果前面没有首先部署应用程序的安全性部署计划,应用程序在这里会部署失败。
If you did not first deploy your application's security deployment plan previously, your application will fail to deploy here.
本文帮助您提前进行一些规划,以改善服务器、客户端或网络中的Ajax应用程序的安全性。
This article helps you do some planning ahead to help improve the security of your Ajax applications, whether they're located on servers, client-side, or networks.
这也就是说,处于各技术级的开发人员都必须为整个应用程序的安全性负起自己应付的责任。
That said, developers at every level of the technology stack must take personal responsibility for the security of the entire application.
在本文中,我们主要集中讨论MIDP应用程序的安全性挑战以及当前可用的或处于开发中的解决方案。
In this article, we'll mainly focus on the security challenges and solutions currently available or in development for MIDP applications.
验证与业务应用程序的安全性和功能一样重要,核心的应用程序逻辑通常和验证程序混杂在一起。
As important as it is to the safety and functionality of your business applications, core application logic is often cluttered with validation routines.
此应用程序的安全性是从管理界面通过定义一个本地密码以便访问界面或运行审计时使用得到确保的。
The application can be secured from the management interface by defining a local password which will subsequently be required to access the interface or run audits.
如果您担心应用程序会影响其他应用程序的安全性,则可以马上就采取一些措施来满足这方面的需要。
If you are concerned about applications violating the security of other applications, there are steps you can take today to address these concerns.
如果ejb层不安全(请参见下一部分),则入侵者可以使用伪造的凭证直接调用EJB,使应用程序的安全性无效。
If the EJB layer is not secured (see the next section), intruders can call an EJB directly with forged credentials, rendering the application's security meaningless.
使用数字证书的客户机身份验证可以帮助克服凭据被破坏的问题,从而让您对应用程序的安全性更加有信心。
Client authentication using digital certificates helps overcome the problem of using compromised credentials and provides a better sense of security about your applications.
这种可移动性概念会在数据和应用程序的安全性和可管理性方面造成问题,这些问题会限制移动解决方案的有效性并增加运营成本。
This concept of mobility creates issues of security and manageability of data and applications, and both issues limit the effectiveness of mobile solutions while increasing their operational cost.
要测试应用程序,首先要部署应用程序的安全性部署计划(在my - db - plan . xml中定义),然后部署应用程序。
To test your application, you first deploy the security deployment plan for your application, as defined in my-db-plan.xml, then you deploy your application.
我发现,如果把追踪应用程序作为家庭公认的提高安全性的工具,而不是作为一个用于监视的秘密工具,那么青少年会更容易接受它。
I've found teens are more acceptable to tracking app when it is included as part of a family agreement to improve safety than when it is placed as a secret tool to watch them.
本文将使用示例代码来演示鼠标力学,从而增强在验证和连续使用应用程序时的安全性。
This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
The examples in this section will focus on an environment without administrative or application security enabled.
我们将说明当前在J2ME平台上可用的应用程序安全性模型,以及该平台对于一些可预料未来趋势的适用性。
We'll explain the current application security models available on the J2ME platform, as well as the platform's suitability to some predictable future trends.
这个简单实现演示了XML加密如何能够成为用于较大型以及比较复杂业务应用程序的可行的安全性框架。
This simple implementation demonstrates how XML Encryption can be a viable security framework for larger and more complex business applications.
本教程以对Web应用程序安全性的概述开始。
This tutorial starts with an overview of Web application security.
大量调查显示,SaaS应用程序的用户通常将安全性排在首位,或至少非常接近首位。
In survey after survey, security is usually listed as either the top concern for subscribers to SaaS applications, or at least very close to the top.
利用J2EE安全性编辑器(J2EE应用程序中的安全性确保只有授权用户可以访问应用程序)。
Making use of the J2EE security editor (security in J2EE applications ensures that only authorized users can access the applications).
本文将着重介绍容器内应用程序的设计,此类应用程序依赖ejb容器提供企业服务,如事务处理和安全性。
This article focuses on the design of in-container applications relying on an EJB container for enterprise services, such as transactions and security.
应用推荐