• Therefore, deleting a parent code group destroys any security behavior that was defined in its child hierarchy.

    因此删除代码将破坏已其子层次结构中定义所有安全行为

    youdao

  • Demands and overrides are used in libraries to help protect resources from callers or to override default security behavior.

    要求重写用来帮助防止调用方调用资源重写默认安全行为。

    youdao

  • By configuring a policy set for the services and references in the sample, you were able to change the security behavior of the services without making any changes to the business logic.

    通过示例中的服务引用配置策略可以更改服务安全行为无需业务逻辑进行任何更改

    youdao

  • Further details on Security and how to customize the default portal behavior will be given in a future article of this series.

    关于安全性进一步细节以及如何自定义缺省门户行为系列后续文章中介绍。

    youdao

  • Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.

    通常一种好的行为因为防止了访问网页跨站点脚本安全性隐患发生

    youdao

  • Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.

    安全日志分析可以检测可疑行为并且允许管理员采取行动

    youdao

  • This behavior for topic security runs counter to the usual behavior of RACF profiles, where the profile that is the best match applies.

    主题安全性这种行为与RACF配置文件正常行为相矛盾,后者采用匹配配置文件。

    youdao

  • The default behavior for EJB security when global security is turned on has changed.

    全局安全性开启用于ejb安全性的缺省行为已经被改变了

    youdao

  • Prior to the advent of aspect-oriented programming (AOP), however, it was difficult to write certain kinds of tests for crosscutting behavior such as security, transaction management, or persistence.

    不过,在面向方面编程AOP出现之前横切行为安全事务管理或者持久性)编写测试困难。

    youdao

  • With the DB2 UDB security plug-in architecture, you can customize its authentication behavior by either developing your own plug-ins, or buying plug-ins from a third party.

    利用DB 2UDB安全插件架构可以通过开发自己插件第三购买插件的方式来定制身份验证行为

    youdao

  • To enable you to customize DB2 UDB authentication behavior, DB2 UDB has exposed APIs that you can use to modify existing plug-ins or build new security plug-ins.

    为了允许定制DB2UDB身份验证行为,DB2 UDB 提供了可用修改现有插件构建新的安全插件的API

    youdao

  • The practitioner who is concerned with intuitive and correct behavior, performance, reliability, usability, availability, and security associated with the development environment

    参与开发环境关联直觉的正确行为性能依赖性可用性有效性以及安全性

    youdao

  • As for spam, ISPs (including mail service providers) could limit their users to, say, 100 e-mails a day; for more, you have to pay or at least post a security bond, or pass some good behavior test.

    对于垃圾邮件,网络服务商(包括邮件服务商)应该用户有所限制,比如说每天只能发一百封邮件,更进一步说,付费至少发布安全债券,或通过一个好的行为测试才行。

    youdao

  • The security architect can decide the type of behavior required for the application, and the application developer can use the appropriate variation from the WebSphere SPI.

    安全架构师可以决定应用程序所需行为类型应用程序开发人员可以使用WebSphereSPI合适变体

    youdao

  • The default behavior depends on the user registry implementation configured for the WebSphere Application Server security component.

    缺省行为取决于WebSphereApplicationServer安全组件配置用户注册中心实现

    youdao

  • The GSS-API default behavior will be to initiate the context for Kerberos security mechanism.

    GSS-API 的默认行为Kerberos安全机制启动上下文

    youdao

  • HTML5 sandbox - a security feature to sandbox third party content on the website, to prevent malicious behavior like cookie stealing, form submission or page redirection.

    HTML5SandBox——该安全特性可以将网站第三内容放在沙箱当中,防止诸如Cookie窃取表单提交或是页面重定向等恶意行为

    youdao

  • Security patches and upgrades to client software add even more complexity because they alter application behavior.

    安全补丁升级客户端软件添加复杂因为它们改变应用程序行为

    youdao

  • Your software should be able to recover from the security exceptions that might arise from its normal behavior as well as alter its functionality seamlessly.

    软件应该能够重新获得这些可能被一些正常行为抛出的安全性异常同时无缝地改变的功能。

    youdao

  • "Security" management theory through the study of unsafe behavior, based on the establishment of a system of employee behavior, the mechanism of improving safety performance.

    行为安全管理理论通过对不安全行为研究建立基于员工行为的、系统的、改进安全绩效的机制

    youdao

  • Insurance consumption is a course or behavior that people meet their own security needing of health, life-span and property through enjoying the insurance products or the insurance service.

    保险消费就是人们通过消耗或享用保险产品保险服务来满足自己身体寿命财产安全保障需要过程行为

    youdao

  • At this high end of the spectrum of conscious and enlightened BEING, our behavior, thinking and speaking are the outward ways by which we convey a sense of inner strength and security.

    有意识,受启迪本体范畴的最高端我们行为思考说话我们传递内心力量安全感外在方式

    youdao

  • Policy driven behavior, particularly for service level, security and quality of service capabilities (for example, WS-Policy)

    策略驱动行为特别是对于服务级别、服务功能安全和质量例如 Web 服务策略(WS-Policy))

    youdao

  • It is very important to understand the relationship between price formation mechanisms and security price behavior both in theory and in practice.

    理解价格形成机制证券价格行为之间关系无论理论上还是从实务来说重要

    youdao

  • The Security Administration Punishment Act provides the illegal behavior of stirring up fights and causing troubles.

    新颁布的《治安管理处罚法》规定了寻衅滋事治安违法行为。

    youdao

  • Trust can resolve the security problem among the entities in military grid, including identity trust and behavior trust.

    信任能够解决信息栅格实体安全问题,可分为身份信任行为信任。

    youdao

  • Trust can resolve the security problem among the entities in military grid, including identity trust and behavior trust.

    信任能够解决信息栅格实体安全问题,可分为身份信任行为信任。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定