• 测试Web应用程序安全配置

    Testing the security configuration for the Web application.

    youdao

  • 用户特定要求取决于DB2安全配置

    The specific requirements of the users depend on the security configuration of DB2.

    youdao

  • 应用程序使用凭据应用程序部署计划安全配置指定

    You specify the credential store to be used by an application in the security configuration in the application's deployment plan.

    youdao

  • 因此应用程序具有不同用户群体不同安全配置,如图12所示

    As a result, applications have a distinct user population and distinct security configuration, shown in Figure 12.

    youdao

  • 清单12显示了用于本文使用示例应用程序之一安全配置

    Listing 12 shows the security configuration of one of the sample applications used in this article.

    youdao

  • 涉及网络规划服务器安全配置数据库安装测试

    It involves the planning of network, the safe disposition of server, the installation test of data bank, etc.

    youdao

  • 这些文件指定了RMI - IIOP与服务器通信使用安全配置

    These files specify security configuration to use in RMI-IIOP communication with the server.

    youdao

  • 可能导致布置网络系统需要信任级别或者会暴露本地安全配置

    This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.

    youdao

  • 每个请求序列使用不同安全配置运行了多次结果记录配置表现最好数据。

    Each request sequence was run multiple times in different security configurations with only the best time for each configuration kept in the results.

    youdao

  • AIXPert提供单一一致安全配置容易多个系统复制安全配置

    AIXPert provides a single, consistent security configuration that is easy to replicate across multiple systems.

    youdao

  • A8还还增加了全新的安全配置,装配了视觉盲点车道偏离警报系统

    The upper-premium A8 also gets blind-spot detection and lane-departure warning systems.

    youdao

  • 分析GSI原理基础上,介绍了基于GSI的安全配置编程关键技术

    On the base of analyzing the theory of GSI, introduce the pivotal technology of deployment and programming of GSI-based system.

    youdao

  • 应用程序Run-as 主体缺省主体应用程序部署计划安全配置指定

    You specify the run-as and default subjects for the application in the security configuration in the application's deployment plan.

    youdao

  • 联系数据库管理员参考db 2文档了解关于DB 2实例安全配置更多信息

    Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.

    youdao

  • 安全探测器根据预先确定配置来验证数据库acl检查台服务器不一致的安全配置

    Security probes that verify a database ACL against a predetermined configuration and that check for inconsistencies in security configurations across multiple servers.

    youdao

  • 可以使用WebSphere应用服务器管理控制台安全配置向导完成安全配置存储库配置

    You can use the security configuration wizard in the WebSphere Application Server administration console to complete the security configuration and repository configuration.

    youdao

  • 安全部署计划部署链接Geronimo允许应用程序随后进行扩展并且使用其中安全配置

    Deploying and connecting the security deployment plan to Geronimo allows your application to later extend and use the security configuration contained therein.

    youdao

  • 唯一区别在于,在进行标准安全配置之后需要通过指定LTPA 令牌使用确保Web服务的安全

    The only difference is that, after you perform the standard security configuration, you need to secure the Web service by specifying the use of the LTPA token.

    youdao

  • 使用WS-SecureConversation 时两个单独安全配置出现服务策略中,STS用于消息交换一个用于目标服务。

    When you use WS-SecureConversation: two separate security configurations are present in the policy for the service, one for the message exchange with the STS and the other for the target service.

    youdao

  • 简化安全 配置

    Simplified configuration of security.

    youdao

  • 出现故障硬件需要修理更换软件需要应用补丁更新升级必须根据需求和潜在安全威胁提前配置系统

    Hardware failures demand repair or replacement; software requires patching, updates, and upgrades; and systems must be configured to keep ahead of demand and potential security threats.

    youdao

  • 根据应用程序需要可以几种方法配置额外安全参数需要部署信息嵌入服务WSDL中。

    Depending on your application needs, you can configure the additional required security parameters in several ways, without embedding deployment information in the service WSDL.

    youdao

  • 传输一个未经验证凭证根据EJB方法配置安全许可,这可能会导致授权失败

    What is transmitted is an unauthenticated credential, which, depending on the security permissions configured on the EJB methods, might cause authorization failures.

    youdao

  • 具有简单配置安全通信,并通过集成rbac允许非根用户收集FFDC数据

    It has simple configuration and secure communication with integrating RBAC to enable non-root users to collect FFDC data.

    youdao

  • 使用SSL 时,可以应用疑问 #1所提到所有安全配置

    The security configurations mentioned in Myth #1 all apply when using SSL.

    youdao

  • 清单6对清单5方法安全拦截配置进行了增强

    Listing 6 shows an enhanced configuration of the method security interceptor that you saw earlier in Listing 5.

    youdao

  • 下图展示以下安全配置测试时间

    The next figures show test times for the following security configurations

    youdao

  • 此外ServiceRegistry安全访问需要配置SSL连接

    Moreover, secure access to the Service Registry requires configuration of an SSL connection.

    youdao

  • 测试所有安全配置中,Axis2始终速度最慢

    Axis2 is consistently the slowest of the stacks across all security configurations for this test case.

    youdao

  • 安全配置可以使用Apachehttpd处理请求它们交给Tomcat。

    A more secure configuration would use the Apache HTTPD to process requests and hand them to Tomcat.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定