• This key exchange security method duplicates an existing one. Either modify it, or cancel this dialog.

    密钥交换安全措施现有重复更改取消此对话框。

    youdao

  • The list is used to match the security method supported by the server and employed during subsequent system calls under this mount point.

    这个列表用于匹配服务器支持安全方法。 此外,随后装载发生系统调用时也用到该列表。

    youdao

  • The first method is USES traditional the security method - rigid body limit zero-method, obtains the safety coefficient can satisfy the standard request.

    第一方法采用传统安全系数-刚体极限平衡法,求得的安全系数满足规范要求

    youdao

  • Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.

    由于轻量级IP设备资源有限引入相关安全措施不可避免地增加资源消耗

    youdao

  • Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.

    Ben谈到了一些高级web安全需求例如方法授权定义方法安全数据的JSR- 250规格、SpringSecurity方法元数据以及领域访问控制等

    youdao

  • Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.

    通过使用声明安全可以定义EJB模块集合描述符中的安全角色为每个角色分配方法许可。

    youdao

  • To improve security, it's often wise to use more than one method of protection (also called "defense in depth").

    提高安全性明智做法是使用多种保护方法(称为“深度防御”)。

    youdao

  • You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.

    EJB身份验证授权配置方法部署描述中定义安全角色每个方法将依据部署描述符执行

    youdao

  • The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.

    J2EE安全模型方法权限基础,因此对于细粒度的安全访问来说,不切实际很麻烦。

    youdao

  • The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.

    声明方法提供易用性编程方法为资源身份验证授权提供更好安全控制级别

    youdao

  • Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.

    系列第2部分主要关注DB 2安全性插件是实现DB 2安全性方法

    youdao

  • Listing 6 shows an enhanced configuration of the method security interceptor that you saw earlier in Listing 5.

    清单6对清单5中的方法安全性拦截配置进行了增强

    youdao

  • Figure 1 shows this concept, with opportunities to hook in events to handle security aspects, or a particular HTTP method (such as GET or POST) event.

    1展示了这个概念,并且还包括了处理安全性方面问题事件特定HTTP方法(比如GETPOST)事件

    youdao

  • Two-factor authentication is a popular method being practiced for increased security.

    双因素身份验证增强安全性的流行方法

    youdao

  • Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.

    生成用户安全属性报告有助于判断识别密码安全策略是否一致地方。

    youdao

  • In part 2 of this series, DB2 security plug-ins were introduced, as well as the method in which DB2 security is implemented, and a list of relevant detailed information about security plug-ins.

    系列第2部分介绍DB 2安全性插件实现DB 2安全性方法一系列安全性插件相关详细信息

    youdao

  • The three separate concerns shown -- "withdraw money," "security," and "logging" -- are tangled in this relatively simple method.

    所显示三个分别关注——“”、“安全性日志记录”——这个相对简单的方法中已经表现得十分复杂了。

    youdao

  • V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.

    V 4符合J2EE 1.2基于安全性角色不是方法授权模型

    youdao

  • Using SSH and VNC, you'll benefit by having a method that complies with the security requirements of most organizations and meets the needs of the members of your team.

    通过使用SSHVNC可以满足大多数组织安全需求,同时满足团队成员需要

    youdao

  • Method-level security of EJB components.

    EJB组件方法级安全性

    youdao

  • Sugroups provides one method of implementing and managing the security policy on your systems.

    sugroup提供种在系统实现管理安全策略方法

    youdao

  • With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.

    了解了这些内容后,更加容易理解利用Acegi方法安全性拦截器下一节将具体介绍主题

    youdao

  • Listing 5 is a sample configuration of Acegi's method security interceptor.

    清单5展示acegi方法安全性拦截器示例配置

    youdao

  • The method security interceptor uses the authenticationManager and accessDecisionManager properties to authenticate and authorize a user before allowing access to a secure bean.

    允许一个安全 bean 进行访问之前方法安全拦截器使用authenticationManageraccessDecisionManager属性用户进行身份验证授权

    youdao

  • Problem analysis: Authorization failures can occur if the Business Events authentication method or Application Server security are note configured correctly.

    问题分析如果BusinessEvents身份验证方法ApplicationServer安全性配置不正确,就出现授权失败

    youdao

  • In this article, you'll explore a method that improves the security of your LAMP installation by using the mod_proxy module and multiple back-end servers.

    本文中,学习一种使用mod_proxy模块多个后端服务器来改进lamp安全性方法

    youdao

  • Whenever an application tries to access a method of a bean secured using Acegi security System, the request is automatically transferred to Acegi's method security interceptor.

    只要应用程序试图访问acegi安全系统保护bean方法请求自动传递到Acegi的方法安全性拦截器。

    youdao

  • Configuring Acegi's method security interceptor.

    配置Acegi方法安全性拦截器

    youdao

  • The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.

    声明方法需要通过web. xml文件应用程序服务器特定的部署文件,来添加安全约束

    youdao

  • So, deployment descriptor properties such as isolation levels, access intent, security, method permissions, and so on cannot be set for such problem methods.

    所以,就无法问题方法设置隔离级别(isolation level)、访问目的(access intent)、安全性security方法许可method permission)这些部署描述符属性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定