Imperative security is very flexible because you can set the state of a permission object and select security actions by using information that is not available until run time.
命令性安全非常灵活,因为您可以使用直到运行时才可用的信息来设置权限对象的状态和选择安全操作。
Based on further analysis and security and non-functional requirements (see security issues affecting the ESB), select an appropriate implementation technology.
基于更多的分析以及安全和非功能性需求(请参阅影响ESB的安全问题),最后选择一种合适的实现技术。
Select the Security identity qualifier, and in the Privilege field enter delegate (Figure 12).
选择Securityidentity限定符,并在Privilege字段中输入delegate(图12)。
If the IBM Cognos 10 application has security applied, select a Namespace from the drop down list, and supply a valid user id (Name) and password.
如果IBMCognos10应用程序应用了安全性,从下拉列表中选择一个Namespace,并提供一个有效的用户id (Name)和密码。
Again, leave the defaults and select Next on the Part 2 screen for the security certificates.
再一次,保留默认值并选择安全证书的Part2屏幕上的Next。
Select methods from the Home and Component interfaces that each selected security role is allowed to invoke (Figure 24), then Finish.
从Home和Component接口中选择方法,每个所选的安全性角色均可调用这些方法(图24),然后选择 Finish。
SpecifyServerUNTBinding for Bindings configuration name, then click Add and select WS-Security to create the application specific binding as shown in Figure 10.
指定ServerUNTBinding作为Bindingsconfigurationname,然后单击add并选择WS - Security以创建特定于应用程序的绑定,如图10所示。
Do not select the Requires authentication check box, and do not enter a user ID and password if security is not?
请不要选择Requiresauthentication复选框,如果门户中没有启用安全性,请不要输入用户标识和密码。
To define security on the measures dimension, select the Cube Facts object in Data Project Explorer and perform the same steps you followed for defining security for a non-measures dimension.
要在度量维度上定义安全性,在DataProjectExplorer中选择cubeFacts对象,然后执行与在非度量维度上定义安全性相同的步骤。
If security is configured for the runtime environment, select the check box security is configured for the runtime environment, and input the userID and password.
如果为运行时环境配置了安全性,选择复选框Securityisconfiguredfortheruntimeenvironment,输入用户ID和密码。
Again, return to the Global security pane (Figure 22), and under Authentication expand JAAS configuration and select J2C Authentication data.
再次返回到Globalsecurity窗格(图22),在Authentication下展开JAASconfiguration,并选择J2C Authenticationdata。
To avoid this security warning when bringing up startapplet.html in the future, click the Always trust content from this publisher check box and select Run.
为避免将来打开startapplet.html时还出现这个安全警告,可以选中Alwaystrustcontentfromthispublisher复选框,然后选择 Run。
Select the default Settings in the Enable operating system security for DB2 objects, and click on Next.
在EnableoperatingsystemsecurityforDB 2objects中选择默认设置,然后单击Next。
Select WS-Security => Authentication and protection => gen_saml20token.
选择WS-Security =>Authenticationandprotection => gen_saml20token。
Enter a name for the bus (RED.Bus), de-select the bus security check-box, and click Next (see Figure 1).
输入一个总线名称(RED .Bus),取消选中Bussecurity复选框,单击Next(见图1)。
Select models of the T43 come equipped with the integrated fingerprint reader with Password Manager and the Embedded Security Subsystem.
选择被受到的影响和密码经理和植入的安全次要系统装备整合的指纹读者的T43 的模型。
In the Local Security Settings console, expand Local Policies, and select User Rights Assignment.
在本地安全策略设置控制台,展开本地策略,选择用户权限指派。
If you set a password but don't select Lock project for viewing, the code can be viewed and edited by anyone, but security measures still help project the project Properties dialog box.
如果设置了密码但未选择“查看时锁定工程”,则任何人都可以查看和编辑代码,但安全性措施仍然会帮助保护“工程属性”对话框。
The scheme is of very strong security, and it allows all users to select their own secret keys.
该方案具有很强的安全性,并且允许所有用户自主选择秘密密钥。
NET write access to a file, right-click the file in Explorer, choose "Properties" and select the Security TAB.
NET写入权限的文件,右键单击该文件,选择“属性”,然后选择安全选项卡。
This paper discusses the security investor's indifference curve and it's efficient set of Portfolio. On the base, it gives out a method to select the best Portfolio.
在讨论证券投资者的无差异曲线和所面对的证券组合有效集(有效界面)的基础上,提出一种选择最佳证券组合的方法。
The difficulty of network security evaluation is how to select and analyze the factors and their attributes, which are highly important to network security.
网络安全评估的难点在于如何选择和分析各种影响网络安全的因素及其属性。
Note: Productivity varies with types and sizes of terminals, so some wires cant be processed without informing in advance. Please select original products to ensure the security of the machine.
注:生产能力与电线端子的种类、大小变化而变化,有些电线不能加工,不作事先通知,请选用原产配件,对机更有保障。
S. airports, the most popular new feature is a security line that lets a select few travelers whiz through the screening process with their shoes on, their laptops stowed and their dignity intact.
如今在美国的四个机场,最受人们欢迎的服务是一条容许部分旅客不用脱鞋、不用打开电脑包便能丝毫无损尊严地快速通过的安检通道。
Go to settings, Location and security, select device administrators and uncheck switchpro widget. You should then be able to uninstall.
设置->位置与安全->选择设备管理器里->七键开关 把勾去掉就可以删除。
Go to settings, Location and security, select device administrators and uncheck switchpro widget. You should then be able to uninstall.
设置->位置与安全->选择设备管理器里->七键开关 把勾去掉就可以删除。
应用推荐