Besides built-in DB2 security capabilities, the software architecture includes a document and metadata handler that is integrated with a security service.
除了DB 2内置的安全功能之外,软件体系结构还包含文档和元数据处理器,它与安全服务集成。
We will begin our exercise by configuring the built-in file-based repository, with the assumption that administrative security was disabled during installation.
我们将通过配置内置的基于文件的存储库开始我们的练习,并假设在安装过程中禁用了管理安全性。
Tablets made for the enterprise market will have some advantages for corporate users, like built-in collaboration and videoconferencing capabilities and security features.
对公司用户而言,面向企业市场的平板电脑拥有一些优点,例如内嵌式协作工具、视频会议功能和安全特性等。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
To keep this example simple, assume that you have built a security schema in this Domino database, such that an employee can only edit her own address data.
为了保持简单,假设Domino数据库中已经建立了一种安全机制,每个雇员只能编辑自己的地址数据。
"Nuclear facilities in Japan... were built to withstand earthquakes — but not an 8.9 earthquake," said James Walsh, a CNN contributor and research associate at MIT's security studies program.
“日本的核设施……是为了经受地震而建的——但不是8.9级地震。”CNN供稿人及麻省理工学院安全研究项目副研究员JamesWalsh说。
It is our experience that both native apps and J2ME apps have much more to offer than those built under the Wireless Application Protocol (WAP), in terms of both features and security.
我们的经验是,无论是在特性还是安全性方面,本机应用程序和J2ME应用程序都比那些以无线应用程序协议(Wireless Application Protocol (WAP))构建的应用程序提供多得多的功能。
Configuration parameters defining the desired WS-Security options are specified in the deployment descriptor to determine how the web service processing chain is built.
在部署描述符中指定定义所需WS - Security选项的配置参数,以确定如何构建Web服务处理链。
It supports CGI with a built-in Perl interpreter, virtual hosting, IPv6, bandwidth management, and security features.
它支持CGI,并具有内建的Perl解释器、虚拟主机、IPv 6、带宽管理和安全性等方面的特性。
Part 1 of this series introduced Acegi and explained how to use its built-in security filters to implement a simple, URL-based security system.
系列文章的第1部分简单介绍了Acegi并解释如何使用其内置的安全过滤器实现一个简单的、基于url的安全系统。
You've already seen a simple application that leverages the built-in Web security features of Little-G.
您已经看到一个简单的Web应用程序如何利用Little - G内置的Web安全特性。
IDS provides three built-in SQL functions for dealing with security labels.
IDS提供了3个用于处理安全标签的内置sql函数。
Part 1 explains how to use Acegi's built-in filters to implement a simple URL-based security system.
第1部分解释了如何使用Acegi的内置过滤器实现一个简单的基于URL的安全系统。
IPv6 is also much more sophisticated than IPv4, with many new features (including built-in security mechanisms).
IPv 6还要比IPv 4复杂得多,有许多新特性(包括内置的安全机制)。
For those worried about using it, the developers insist that they have built in enough security to enable users to remain anonymous.
对于那些担心使用它的人来说,该程序的开发者强调它有足够的安全让使用者保持匿名。
In this article I have presented the AIX IP filtering capabilities, a useful built-in feature that will allow system administrators to implement an extra layer of security in their servers.
在本文中,我演示了AIXIP过滤功能,这是一项内置的而且很有用的功能,可让系统管理员在服务器中实现额外的安全层。
Palestinians bitterly complain about Israel's security barrier, or wall, surrounding Bethlehem, which was built in response to a wave of suicide bombings a few years ago.
巴勒斯坦人愤怒地抱怨以色列在伯利恒周围建立的安全屏障,这个围墙是几年前为了应对自杀性爆炸袭击的猛增而修建的。
Database security administrator (DBSECADM) is a new built-in role introduced to perform all security-related administration, including setup of the LBAC security infrastructure.
数据库安全管理员(DBSECADM)是一个新的内置角色,用于执行所有与安全相关的管理,包括LBAC安全基础设施的设置。
Security policies fall into three types: built-in, customized and high-level.
安全策略分为三类:内置、自定义和高级策略。
And they've built in security features that would prevent the laser from being used if pirates managed to take over the ship.
而且,他们还内置了安全特性,以防如果海盗控制船只后使用该激光设备。
Like all Macs, these computers have, in my opinion, a better operating system, better built-in software and better security than their Windows competitors.
我认为,与Windows电脑相比,这两款电脑就像所有苹果电脑一样,拥有更好的操作系统、内置软件和更高的安全性。
The Persevere server has built-in, data-centric security capabilities that are enforced on the server.
Persevere服务器具有内置的、以数据为中心的安全性,这类安全性在服务器上实施。
Witnesses and security camera video of the gunmen built a portrait of them as young men dressed in jeans and trendy T-shirts, bearing rucksacks and guns.
目击者和安全探头记录已经形成了恐怖疯子的基本面部特征,他们都很年轻,穿着牛仔裤,潮流T-shirt,背着帆布包,拿着枪。
It includes mandatory access control built on top of the Flux Advanced security Kernel (Flask) security architecture, including type enforcement and multilevel security (MLS), all as plug-in modules.
它包括构建在FluxAdvancedSecurityKernel (Flask)安全架构之上的强制访问控制,后者包括以插件模块形式提供的类型强制和多级安全(MLS)。
Built-in Scalability, Reliability, and security.
内建的伸缩性、可靠性和安全性。
Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
The key lies in the completion of data processing, analysis, coupling, the premise of the transfer, and the transmission of data must be built on the basis of information security.
其关键在于完成数据的处理、分析、耦合,其前提在“传递”,而数据的传递须建立在信息安全基础之上。
Bring a water bottle with a built-in filter to fill up at a drinking fountain after going through security. It saves money and keeps you hydrated and healthy.
携带一支带有内置过滤器的水瓶,你可以在通过安检之后在饮用水龙头处灌满它。这样既省钱又可以让你随时补充水分并且很健康。
In-built security solutions that can sense, adapt, modify and respond to threats based on various ecosystem parameters will gain traction.
可以感知、改编、修改,并根据不同生态系统参数自动应对威胁的内置安全解决方案,将受到追捧。
Finally, a test platform is built to test the prototype system in terms of remote control, network security and network parameter configuration.
本文最后搭建了一个测试平台,从远程控制、网络安全性和参数配置三方面对原型系统进行测试。
应用推荐