To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.
为了保证在网络化的协同企业建模系统中对模型的安全访问,需要建立一套有效的访问控制机制。
It's hard to stay ahead of the game in network security when the landscape is constantly changing.
当形势不断变化时,在网络安全领域保持领先地位是困难的。
How do you determine the level of security in your office network, even if you have a network administrator manning it?
我们又应该如何来判断办公网络的安全级别呢(尽管您可能有一个网络管理员在管理网络)?
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
In my day-to-day work, I have found that many users are frustrated by new security imperatives imposed by network managers.
在日常工作中,我发现许多用户因为网络管理人员实施的新的安全规则而倍受挫折。
Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.
与您公司内负责网络管理和安全的人员协作,解决潜在的连接问题。
This paper analyzes packet capturing principle in detail combined with the structure and functions of the software and introduces its application in designing a network security and watch system.
文中结合该软件包的结构与功能对包捕获原理进行了详细的分析,并介绍了其在网络安全监控系统中的应用。
These encrypted service tickets (credentials) are only understood by the client and the server, so there is minimal security risk, even in the event that the ticket is intercepted from the network.
这些加密的服务标签(凭证)只有客户机和服务器能理解,所以即使标签在网络中被拦截,安全风险也很小。
Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.
如果需要以更清楚的格式向安全经理报告信息,实现密码策略会非常费时间,尤其是在处理大型企业网络时。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The overall security of a network is only as strong as its weakest link, and in a mobile-commerce network the weakest link is the client-side device.
网络总体安全性的强度取决于其最薄弱的环节,而在移动商业网络中,最薄弱环节是客户机端设备。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
You're so preoccupied with configuring your file systems properly and ensuring the security of your systems that you might routinely forget that the N in NFS stands for network.
您太过专注于合理配置文件系统和确保系统的安全性,因而可能经常忘记NFS中的N代表网络。
To communicate with a WebSphere Cloudburst Appliance, you will need to implement the network element, including security management, which is described in the conclusion to this series.
要与WebSphereCloudburstAppliance进行通信,您将需要实现网络元素,包括安全管理,这在本系列结束语中进行了描述。
Security researchers have shown that the network used to make 80 per cent of the world's phone calls is vulnerable to hacking, building on work demonstrated in previous years.
安全专家表示全球百分之八十的手机通讯网络非常容易被黑客攻击,这是依据前几年的研究做此结论。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.
当初之所以在.NET中引入这个特性,是为了阻止从网络上进行的安全攻击。
This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.
这可能导致布置在网络中的系统需要的信任级别更低,或者会暴露本地的安全配置。
Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.
但是,架构师需要了解物理层以避免网络瓶颈和安全暴露。
The research will be presented at the Network and Distributed System Security Symposium in early February.
研究将在二月初网络和分布式系统安全座谈会上发表。
Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.
这些问题构成了一个控制的挑战,因为基于尝试和测试的网络级安全控制在一个给定的云环境中可能无法正常工作。
We will improve financial institutions' ability to manage risks, make progress in developing a security network for the financial system, and guard against systemic risks.
提高金融机构风险管理水平,推进金融体系安全网建设,防范系统性金融风险。
Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.
如果网络级的安全控制在IaaS网络基础设施中无效,就会出现在虚拟化网络中基于网络的控制不足。
"You can never be too careful in this day and age, " Craigslist security and network technician Sheila Wilder said. "Just look at MySpace.
“在这个年代,小心至上,”Craigslist的安全和网络技术员希拉·怀尔德说,“单单看那个MySpace网站。
"You can never be too careful in this day and age, " Craigslist security and network technician Sheila Wilder said. "Just look at MySpace.
“在这个年代,小心至上,”Craigslist的安全和网络技术员希拉·怀尔德说,“单单看那个MySpace网站。
应用推荐