This query displays all security groups within the local domain.
此查询显示本地域中的所有通讯组。
The lists of key pairs and security groups are created outside the loop.
密匙对和安全组的列表在循环外部创建。
Securitygroups.php - Lists all security groups defined for your account.
php—列示为您的帐户定义的所有安全组。
Users are added to or removed from security groups or permissions are updated.
已在安全性群组中加入或移除使用者,或更新使用权限。
Each list is a string that contains the HTML and elements for the key pairs and security groups.
每个列表都是一个字符串,它包含针对密匙对和安全组的HTML 和元素。
Amazon EC2 calls these instances security groups and has API calls and commands to manipulate them.
AmazonEC2调用这些安全组并使用API调用和命令来操作它们。
Some Information Security Groups without a proactive risk management program may rely on fear to motivate the organization.
某些没有前瞻性风险管理计划的信息安全组可能依赖于恐惧来推动组织。
This role is required to allocate the RID pool so that new or existing domain controllers can create user accounts, computer accounts or security groups.
此角色用于分配rid池,以便新的或现有的域控制器能够创建用户帐户、计算机帐户或安全组。
This article covers the basics of working with images, starting and stopping instances of those images, and the key pairs and security groups that let you secure the instances.
本文介绍关于使用映像、启动和停止映像实例、保护映像实例的密匙对和安全组的基础知识。
This article presented a set of pages to work with virtual machine images, running instances of those images, and the key pairs and security groups that allow you to manage them.
本文呈现一组页面以处理虚拟机映像,映像的运行实例,以及允许您管理实例的密匙对和安全组。
An extraordinary behind-the-scenes struggle is taking place between computer security groups around the world and the brazen author of a malicious software program called Conficker.
在全球范围内,一场非同寻常的幕后战斗正在计算机安全组织同那些被叫做conficker的邪恶程序的无耻的病毒编制者之间展开。
The roles are mapped to real users and groups at application deployment time, during a process called security role mapping.
角色将在应用程序部署时映射到实际的用户和组(在称为安全角色映射 的过程期间进行)。
Dabbagh is also calling on all groups to cooperate to improve security for the sake of Iraqi citizens.
达巴格还呼吁所有组织进行合作,为伊拉克人民的利益改善安全状况。
A common theme must be ensuring equity and giving priority to protecting the health security of particularly vulnerable groups.
一个共同的主题显然是确保公平和优先关注保护特定弱势群体的卫生安全。
Because of OS level security you will need to make sure that the users and groups for the systems are consistent.
由于使用操作系统级别的安全性,因此将需要确保系统间的用户和组保持一致。
The token contains the user's security attributes, including customization attributes and groups.
该令牌包含用户的安全属性,其中包括自定义属性和组。
A more realistic application would have J2EE roles defined and mapped to groups in the security registry.
更实用的应用程序将定义J2EE角色,并将其映射到在安全注册中心中的组。
Security configuration: Create and manage users and groups, manage authorization groups.
安全配置:创建和管理用户和组,管理授权组。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Since users can be members of any number of groups, it is simple to create new groups to handle resource security.
由于用户可以同时是多个组的成员,所以只需要创建新的组就可以安全使用资源。
Also, letting users specify arbitrary groups using this option can lead to security breaches.
而且让用户使用这种选项指定任意组将破坏安全性。
Make sure that as these teams form, security experts are incorporated into the groups.
确保在形成这些团队时,在各个团队中引入安全专家。
Corporations have done plenty to build security into their corporate it groups - social media seems to want to break down those barriers and, indeed, cause a company a lot of problems.
不少企业在他们的公司网络中安装了安全系统,社会媒体则希望跨越这些障碍。确实,社会媒体为企业带来了很多麻烦。
A security role that groups all authenticated and unauthenticated system users must be created.
必须创建一个用于对所有通过验证和没有通过验证的系统用户进行分组的安全角色。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
Security administration for groups and roles
针对组和角色的安全管理
Security administration for groups and roles
针对组和角色的安全管理
应用推荐