The login process, however, uses the Linux username to choose an SELinux user for your security context.
但是,登录进程将使用Linux用户名来为安全上下文选择SELinux用户。
Wasn't your decision to trade off programmer efficiency, security, and software reliability for run time performance a fundamental mistake?
你在为运行时性能权衡编程效率、安全、软件可靠性而做出的决定是否是一个根本错误?
The elephant in your living room is your Internetconnected security camera, a device people are increasingly using for peace of mind in their homes.
你客厅里的大象就是你的联网安全摄像头,人们逐渐在家里使用它来获得内心的平静。
The elephant in your living room is your Internet-connected security camera, a device people are increasingly using for peace of mind in their homes.
“客厅里的大象”就是家里的联网安全摄像头。这一设备的使用越来越广,有了它,人们在家就能安心了。
However, that same act of sharing could be problem for your own security.
然而,同样的分享行为会为你自己带来安全问题。
For global health security, I share your deep concern about the looming threat of an influenza pandemic.
对全球卫生安全来说,我与你们一样也在深切关注一场大流行性流感迫近的威胁。
You can set clear quality objectives for things like performance and security testing, and defining environments for your automated test coverage.
您可以为性能和安全性测试之类的事情设置质量目标,并为您的自动化测试覆盖面定义环境。
When you think about what you truly live for, your answer probably won't be security. At least mine's not.
当你思考你生存的真正目的时,你的答案未必会是为了保障,至少我的不是。
And now, as we inevitably say on such posts - over to you. What are your handy tips for bike home security? And have you made any costly mistakes?
现在,正如我们经常要对你们说的。你的自行车家庭安全需知是什么呢?你犯过代价高昂的错误吗?
For example, the way your company handles security is probably consistent throughout an application and across multiple applications.
例如,公司处理安全性的方式在整个应用程序甚至多个应用程序中可能都是一致的。
The registration process for users involves entering your Social Security number, date of birth and other data.
用户注册登记过程包括输入你的社会安全号码、生日和其他资料。
Understanding how a UNIX system places its data in its directories should be helpful in planning a volume configuration for your system to optimize performance and security.
充分了解UNIX系统在目录中放置数据的方式,有助于为系统制定卷配置计划,从而优化性能和安全性。
You can also assign a Master Password that you must enter in order to "unlock" the rest of your passwords for some added security.
你也可以设置一个管理密码这样你必须先输入该密码来解锁其余的安全密码。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
By using Shiro, you can provide security for your application without writing all of the code from the beginning.
使用Shiro,您就能够为您的应用程序提供安全性而又无需从头编写所有代码。
You should set your own security criteria for using these and other mashup resources.
您应当为这些和其他mashup资源的使用设定您自己的安全标准。
If the provider does not give you the answers you want, make the preparations to provide security for your mashup and other types of Web applications.
如果服务提供商没有给出您希望的答案,那么准备好为您的mashup和其他类型的Web应用程序提供安全性。
Securitygroups.php - Lists all security groups defined for your account.
php—列示为您的帐户定义的所有安全组。
Do employ the same security mechanisms for your APIs as any web application your organization deploys.
为你的API启用其它任何你的组织已部署的web应用同样的安全机制。
The SANS Institute is your one-stop shop for security information, certification programs, and research.
SANSInstitute是您获取安全信息、认证项目和研究材料的一站式中心。
Now that you've defined the security for your application, you need to connect it to an LDAP solution which manages the users of your Web application.
为应用程序定义了安全性之后,还需要将其与一个用来管理 Web 应用程序用户的LDAP解决方案进行连接。
To test your application, you first deploy the security deployment plan for your application, as defined in my-db-plan.xml, then you deploy your application.
要测试应用程序,首先要部署应用程序的安全性部署计划(在my - db - plan . xml中定义),然后部署应用程序。
You can also use the security Settings link on this page to bypass the wizard's default offer to set up the necessary code access security for your project.
也可使用该页面上的SecuritySettings链接以不使用向导提供的默认值,来为项目设置必要的代码访问安全性。
Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.
联系您的数据库管理员或参考db 2文档了解关于您的DB 2实例的安全配置的更多信息。
And just as you fought for us, we're going to keep fighting for you -for more jobs, for more security, for the opportunity to keep your families strong and America competitive in the 21st century.
就像你们曾为我们而战斗一样,我们将为你们而奋斗——为了更多的工作机会,为了更加安宁,为了让你们的家庭更稳固的机遇,为了美国在21世纪的竞争力。
Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.
与您公司内负责网络管理和安全的人员协作,解决潜在的连接问题。
The infrastructure was developed by creating the database tables and the security deployment plan for your application.
基础设施的开发是通过为应用程序创建数据库表和安全部署计划而进行的。
This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
本文将使用示例代码来演示击键力学如何在验证及连续数据输入环境中增强应用程序安全性。
This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
本文将使用示例代码来演示击键力学如何在验证及连续数据输入环境中增强应用程序安全性。
应用推荐