At the end of the paper comments and analysis of the Security Complex Theory are offered.
文章的最后部分将对“复合安全理论”进行评论与分析。
The example however, does not take into account the more complex issues of security, internationalization, privacy, and performance that would be necessary in a such large scale application.
但是,这个示例没有考虑更复杂的安全性、国际化、隐私和性能方面的问题,在大规模的应用程序中,这些问题都是必须考虑的。
Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue.
企业安全策略可能作为一致性维度的一部分,但安全性常常是一个复杂的文化问题。
It involved a complex synthetic security derived from existing mortgage-backed securities by cloning them into imaginary units that mimicked the originals.
它涉及一种复杂的合成证券,源自于将现有的抵押贷款证券“克隆”成模仿原型的虚构单位。
This allows the security administrator to compose more complex disclosure effects by enabling several policies, while each individual policy is relatively simple and intuitive.
这使安全管理员能够通过启用几个策略,组合出更复杂的公开效果,同时保持各个策略简单且直观。
Tree security label component: a tree is a collection of elements representing a complex hierarchy having multiple nodes and branches.
树安全标签组件:树是一个元素集合,用于表示有多个节点和分支的复杂层次关系。
World health Day, devoted this year to international health security, focuses attention on these complex and interrelated threats to our collective security.
世界卫生日今年的主题是国际卫生安全,侧重于对我们集体安全的这些复杂和相互关联的威胁。
A TCS must be capable of managing an arbitrarily complex transaction, with nesting, concurrency, security, scheduling, and all of the other issues discussed in this article.
TCS必须能够管理带有嵌套、并发、安全、进度,及本文中所讨论的所有其他问题的任意复杂的事务。
They will be required to address the more systematic security concerns of enterprise customers as well as the more complex identity management scenarios that enterprises present.
他们需要解决的是,企业客户的安全意识要求越系统,企业目前的解决方案的身份管理越加复杂。
Security is a complex topic, and the current approaches to securing SOAP seem to be taking a layered approach.
安全性是个复杂的问题,目前确保SOAP的安全性需要采取分层的方法。
While the answer to that one is a bit intractable, it's certainly the case that tools can find security holes, complex code, and performance bottlenecks that are evil indeed.
虽然对其的回答有一点困难,但是肯定的是工具可以找出确实邪恶的安全性漏洞、复杂的代码,和性能瓶颈。
NIS + is, however, significantly more difficult and complex to set up and keep running because of the security requirements.
不过,由于安全方面的要求,NIS +的设置和正常运行较为困难,更为复杂。
We arrived at one complex only to be directed to another, which bore the legend, in English, without security there is no freedom.
我们抵达一个地方之后又被带往另外一处,上面写着一句话,翻译成英语就是“没有安全就没有自由”。
Today, hordes of software developers, QA technicians, and IT managers are required to handle complex and unreliable backend systems that provide federated security between enterprises.
今天,一大群软件开发人员、QA 技术人员和IT经理都需要处理复杂的和不可靠的后端系统,这些系统提供了企业之间的联合安全性。
This simple implementation demonstrates how XML Encryption can be a viable security framework for larger and more complex business applications.
这个简单实现演示了XML加密如何能够成为用于较大型以及比较复杂业务应用程序的可行的安全性框架。
Not only is this complex, but it can result in an increased burden of security at the hub.
这不仅复杂,还可能导致轮毂处的安全负担增加。
Implementation of a JACC provider that extends the J2EE security model is a complex task and should not be undertaken lightly.
实现扩展J2EE安全模型的JACC提供程序是一项复杂的任务,不应轻视。
And it is one thing to build a new road, but quite another to put in place complex new systems providing social security.
建造新路是一回事,而提供保障社会安全的复杂新系统却是另一件事。
Instead of enforcing complex passwords, as many organizations do, the new scheme makes sure than no more than a few users can have the same password, which has a similar overall effect on security.
无需如许多组织那样,使用复杂的密码,这种新方法确保很少人使用相同的密码,这对于安全有一个相似整体的效果。
The current international security environment is complex and fluid. Nuclear proliferation remains a pressing issue and nuclear disarmament a long and arduous task.
当前,国际安全环境复杂多变,核扩散问题依然突出,核裁军任重道远。
Also WS-Security Policy is very complex, so it would take a long time to validate ever assertion manually, and manual validation is error prone.
而且,WS - SecurityPolicy非常复杂,因此手动验证每个断言非常耗时,而且手动验证很容易出错。
The requirements might call for WS-Security, for example, or support for a complex industry standard schema.
例如,需求可能是 WS-Security,或支持复杂的工业标准模式。
Returning to the schema, to fetch the social security number of type xs: string that's inside the policyholder-information complex type, XMLBeans provides the following method.
让我们再回到模式,为了提取policyholder -information复杂类型中的xs:string类型的社会安全号,XMLBeans提供了以下方法。
The Participant pattern lets you make the transition from simple aspects to more complex ones such as those for transaction management, thread safety, security, etc.
Participant模式可以将简单的方面转换为更复杂的方面,如负责事务管理、线程安全、安全性等方面。
In addition to producing intuitive and beautiful objects, Ideo USES its well-honed design process to tackle urgent and highly complex problems such as security, water scarcity and global poverty.
除了制造直观且美观的界面产品,Ideo公司利用精巧的设计工艺还可以处理十分紧急且高度复杂的问题,诸如安全、水稀缺和全球贫困问题。
Service composition is highly complex and often includes transactions, unit-of-work boundaries, error handling, security and propagation of credentials, and aggregation of business logic.
服务合成(service composition)是相当复杂的,而且常常涉及到事务、工作单元边界、错误处理、安全性与证书分发、以及业务逻辑聚合等方面的问题。
It provides more complex and powerful functions than a Web server does, such as session management, load balancing, messaging, transaction management, security, etc.
相对于Web服务器,它提供了更为复杂和强大的功能,例如会话管理、负载平衡、消息传递、事务管理、安全,等等。
It provides more complex and powerful functions than a Web server does, such as session management, load balancing, messaging, transaction management, security, etc.
相对于Web服务器,它提供了更为复杂和强大的功能,例如会话管理、负载平衡、消息传递、事务管理、安全,等等。
应用推荐