It also points you to resources about how to secure systems in general.
它还列出了有关通常情况下如何保证系统安全的资源。
One subtle aspect of secure systems is the concept of validating the target of a request.
安全系统的一个较为微妙的方面是验证请求目标的概念。
If Sony had built more secure systems, it would not find itself being mocked in the public square.
如果索尼事先构建了更为安全的系统,那么它就不会发现自己沦为在公开场合遭到嘲笑的对象。
But too often, human frailties gum up the works by leaving unforeseen breaches in otherwise secure systems.
但情况经常是,人为过失在原本安全的系统中留下意外的漏洞,把事情弄糟。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (AccessControlList) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
The Java EE specification and WebSphere Application Server provide a powerful infrastructure for implementing secure systems.
J2EE规范和WebSphereApplicationServer提供了一种用于实现安全系统的强大的基础设施。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.
标记是实现多级安全系统的基础,实施强制访问控制的前提。
Before delving into specific point-by-point recommendations, let's take a moment to outline the fundamental techniques for creating secure systems.
在详细研究具体建议之前,我们先花一些时间来概述创建安全系统的基础技术。
Before delving into specific point-by-point recommendations, we want to take a moment to outline the fundamental techniques for creating secure systems.
在详细研究具体建议之前,我们打算花一些时间来概述创建安全系统的基础技术。
SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.
SQLInjection攻击与应用程序开发人员紧密相关,因为它们可用于侵入据推测是安全的系统并窃取、更改或销毁数据。
"The Human Factor," treated in Chapter 17, is a critical aspect of truly secure systems that is often ignored in breathless discussions about new security technology.
在17章中讲述的“人的因素”,这是我们在讨论新的安全技术时,经常忽略掉的安全系统很关键的一个方面。
These are important capabilities called out in PCI DSS Requirements 2 (don't use vendor default passwords), 6 (maintain secure systems), and 11 (regularly test system security).
这些重要的功能能够满足pciDSSRequirements2(不使用厂商的默认密码)、6(维护安全的系统)和11(定期测试系统安全性)。
Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.
可信的证书权威机构发布数字证书,它们被用来鉴别用户和组织访问Web站点,e - mail服务器和其他安全系统的权限。
It architects and lead developers should read this book so they can intelligently discuss security-cost trade-offs with management and apply its techniques to produce more secure systems.
IT架构师和主要开发人员应当阅读本书,这样,他们就能够明智地讨论安全-成本取舍,并且运用一些技巧以拥有更安全的系统。
Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。
This is a risk and an area of concern for systems where there is a need for highly secure solutions.
这会带来风险,对于需要非常安全的解决方案的系统,这可能是很严重的问题。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
With over 70% of attacks now carried out over the web application level, organisations need all the help they can get in making their systems secure.
当前已经有超过70%的攻击发生在网络应用层,各级组织急需要能够保证他们的系统安全性的帮助。
Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.
这些信息有许多自由度和许多不同的来源,所以一些用户往往会忽视安全性问题,部署的系统不够安全。
Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.
第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
However, you should also spend some time ensuring that other computers, including your desktop systems, are reasonably secure.
不过,您也应该花一些时间来确保其他计算机(包括您的桌面系统)也具有合理的安全性。
As quantum hackers continue to put systems through their paces, such loopholes will be closed-as these now have been-and the systems become more secure.
随着量子黑客们继续考察系统的防护能力,这些漏洞将被关闭——就像现在所做的——系统也变得更加安全。
You must communicate that any conversion to an SOA model involves an inherent security paradox: the more SOA your systems are, the less secure they are.
您必需让大家认识到,到soa模型的任何转换都会涉及到固有的安全矛盾:系统的soa特征越明显,其安全性越差。
Finally, guests can check-out from their mobile device at any time, even once they have left the property, settling outstanding charges via secure payment systems.
最后,客户可以在任何时候通过手机结账,甚至在他们离开酒店之后,他们也可以通过安全的支付系统来结算一些未支付的费用。
Since many of us don't go to that extreme to keep our systems secure, how do we assess our vulnerability?
我们很多人都没有把自己的系统安全性挖掘至极至,那么我们应该如何来评估系统的缺陷呢?
There are several classic deadlock and synchronization problems the student must understand in order to begin to reason about creating secure, efficient operating systems.
为了开始创建安全、有效的操作系统,学生必须了解许多经典的死锁和同步问题。
This tends to lead to people overlooking security issues and to deploying systems that are not secure.
这往往使人们忽视安全性问题,部署的系统不够安全。
This tends to lead to people overlooking security issues and to deploying systems that are not secure.
这往往使人们忽视安全性问题,部署的系统不够安全。
应用推荐