• Based on the active defense model of the network data transmission, a method of security measurement of the network data transmission is proposed.

    基于网络数据传输过程中的主动防御模型提出一种网络数据传输过程中的安全性进行测量、量化和评估的方法

    youdao

  • Another aspect of Security Management that can now be visually created and manipulated is Method Permission.

    用户能够直观创建操作安全性管理另一个方面方法许可

    youdao

  • It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.

    总的说来一种非常粗粒度安全形式,用于处理系统功能领域访问可以urlEJB组件方法调用进行定义

    youdao

  • To improve security, it's often wise to use more than one method of protection (also called "defense in depth").

    提高安全性明智做法是使用多种保护方法(称为“深度防御”)。

    youdao

  • The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.

    声明方法提供易用性编程方法为资源身份验证授权提供更好安全控制级别

    youdao

  • Vendors choosing this method of kernel adaptation will therefore be held responsible for maintaining their own packages for the lifetime of their product, with respect to both bugs and security fixes.

    供应商选择这种方法因此内核适应追究维持产品寿命自己方面错误安全补丁负责

    youdao

  • Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.

    系列第2部分主要关注DB 2安全性插件是实现DB 2安全性方法

    youdao

  • UNIX's method of handling file systems and volumes provides you with an opportunity to improve your computers' security and performance.

    通过利用UNIX处理文件系统方法可以提高计算机安全性性能

    youdao

  • An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.

    例如服务提供方要求采用一种特殊加密方法服务请求方没有支持这种加密方法安全基础架构

    youdao

  • Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.

    生成用户安全属性报告有助于判断识别密码安全策略是否一致地方。

    youdao

  • Using SSH and VNC, you'll benefit by having a method that complies with the security requirements of most organizations and meets the needs of the members of your team.

    通过使用SSHVNC可以满足大多数组织安全需求,同时满足团队成员需要

    youdao

  • Sugroups provides one method of implementing and managing the security policy on your systems.

    sugroup提供种在系统实现管理安全策略方法

    youdao

  • With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.

    了解了这些内容后,更加容易理解利用Acegi方法安全性拦截器下一节将具体介绍主题

    youdao

  • Even though both these methods of authentication are more secure than RSH rhost-based authentication, you should choose the method that more closely matches your security requirements.

    虽然认证方法基于rshrhost认证安全,但是应该选择符合自身安全需求方法

    youdao

  • Method-level security of EJB components.

    EJB组件方法级安全性

    youdao

  • Returning to the schema, to fetch the social security number of type xs: string that's inside the policyholder-information complex type, XMLBeans provides the following method.

    让我们再回到模式为了提取policyholder -information复杂类型中的xsstring类型社会安全XMLBeans提供了以下方法。

    youdao

  • The snippet in Listing 9 shows how to call the EJB method under the identity of a subject whose credentials were received from the security handler.

    清单9中的片段展示如何安全处理程序接收主体的凭证这个主体身份调用EJB方法

    youdao

  • Listing 5 is a sample configuration of Acegi's method security interceptor.

    清单5展示acegi方法安全性拦截器示例配置

    youdao

  • In this article, you'll explore a method that improves the security of your LAMP installation by using the mod_proxy module and multiple back-end servers.

    本文中,学习一种使用mod_proxy模块多个后端服务器来改进lamp安全性方法

    youdao

  • This part of the work is required regardless of the implementation method used, so there's a limit to how much improvement can be made to WS-Security processing times.

    一部分工作必需的,而与所使用实现方法无关因此WS - Security处理时间的改善有限的。

    youdao

  • The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.

    术语WS-Policy定义治理例如传输方法安全性加密级别框架

    youdao

  • Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    方法权限安全性角色映射特定EJB方法安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法URL模式的一个组合

    youdao

  • In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.

    这份共分三部分系列文章中介绍了如何使用Acegi安全系统增强基于URL安全性基于方法的安全性。

    youdao

  • The malware that led to the hacking of security giant RSA may have been a "zero-day attack" – ie, it had never been seen beforebut the method of infection was nothing new.

    恶意软件导致安全巨人RSA公司遭到“zero-day attack”攻击(指系统缺陷,黑客抓住发起攻击)--通过IE以前没有发生过这种事--但是攻击技术却是老套。

    youdao

  • Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.

    通过使用声明安全可以定义EJB模块集合描述符中的安全角色为每个角色分配方法许可。

    youdao

  • The VA team used an AIE method to analyze which combination of optional components would be the most effective in reducing security-related losses.

    VA团队使用AIE方法分析可选组件哪些组合减少安全相关的损失方面有效

    youdao

  • The traditional user ID and password method of authentication is no longer effective or sufficient in this day and age where security is a major concern for large infrastructures.

    如今,对于大型的基础设施来说,安全需要重点考虑个问题,传统使用用户ID密码进行验证的方法不再有效或者说这种方法不再能包办一切。

    youdao

  • Listing 6 shows an enhanced configuration of the method security interceptor that you saw earlier in Listing 5.

    清单6对清单5中的方法安全性拦截配置进行了增强

    youdao

  • Listing 6 shows an enhanced configuration of the method security interceptor that you saw earlier in Listing 5.

    清单6对清单5中的方法安全性拦截配置进行了增强

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定