This key exchange security method duplicates an existing one. Either modify it, or cancel this dialog.
此密钥交换安全措施与现有的重复。请更改它,或取消此对话框。
The list is used to match the security method supported by the server and employed during subsequent system calls under this mount point.
这个列表用于匹配服务器支持的安全方法。 此外,随后在该装载点下发生系统调用时也用到该列表。
The first method is USES traditional the security method - rigid body limit zero-method, obtains the safety coefficient can satisfy the standard request.
第一种方法是采用传统的安全系数法-刚体极限平衡法,求得的安全系数能满足规范要求。
Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.
由于轻量级IP设备的资源有限,引入相关的安全措施将不可避免地增加资源消耗。
Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.
Ben还谈到了一些高级web安全需求,例如方法层的授权、定义方法安全元数据的JSR- 250规格、SpringSecurity方法元数据以及领域的访问控制等。
Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.
通过使用声明的安全,您可以定义EJB模块的集合描述符中的安全角色,并为每个角色分配方法许可。
To improve security, it's often wise to use more than one method of protection (also called "defense in depth").
要提高安全性,明智的做法是使用多种保护方法(也称为“深度防御”)。
You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
EJB 的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.
本系列的第2部分主要关注DB 2安全性插件,这是实现DB 2安全性的新方法。
Listing 6 shows an enhanced configuration of the method security interceptor that you saw earlier in Listing 5.
清单6对清单5中的方法安全性拦截器的配置进行了增强。
Figure 1 shows this concept, with opportunities to hook in events to handle security aspects, or a particular HTTP method (such as GET or POST) event.
图1展示了这个概念,并且还包括了处理安全性方面问题的事件和特定的HTTP方法(比如GET或POST)事件。
Two-factor authentication is a popular method being practiced for increased security.
双因素身份验证是增强安全性的流行方法。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
In part 2 of this series, DB2 security plug-ins were introduced, as well as the method in which DB2 security is implemented, and a list of relevant detailed information about security plug-ins.
本系列的第2部分介绍了DB 2安全性插件、实现DB 2安全性的方法及一系列与安全性插件相关的详细信息。
The three separate concerns shown -- "withdraw money," "security," and "logging" -- are tangled in this relatively simple method.
所显示的三个分别的关注——“取钱”、“安全性”和“日志记录”——在这个相对简单的方法中已经表现得十分复杂了。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
Using SSH and VNC, you'll benefit by having a method that complies with the security requirements of most organizations and meets the needs of the members of your team.
通过使用SSH和VNC,可以满足大多数组织的安全需求,同时满足团队成员的需要。
Method-level security of EJB components.
EJB组件的方法级安全性。
Sugroups provides one method of implementing and managing the security policy on your systems.
sugroup提供一种在系统上实现和管理安全策略的方法。
With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.
了解了这些内容后,就更加容易理解并利用Acegi的方法安全性拦截器,下一节将具体介绍该主题。
Listing 5 is a sample configuration of Acegi's method security interceptor.
清单5展示acegi的方法安全性拦截器的示例配置。
The method security interceptor uses the authenticationManager and accessDecisionManager properties to authenticate and authorize a user before allowing access to a secure bean.
在允许对一个安全 bean 进行访问之前,方法安全拦截器使用authenticationManager和accessDecisionManager属性对用户进行身份验证和授权。
Problem analysis: Authorization failures can occur if the Business Events authentication method or Application Server security are note configured correctly.
问题分析:如果BusinessEvents身份验证方法或ApplicationServer安全性的配置不正确,就会出现授权失败。
In this article, you'll explore a method that improves the security of your LAMP installation by using the mod_proxy module and multiple back-end servers.
在本文中,您将学习一种使用mod_proxy模块和多个后端服务器来改进lamp安全性的方法。
Whenever an application tries to access a method of a bean secured using Acegi security System, the request is automatically transferred to Acegi's method security interceptor.
只要应用程序试图访问由acegi安全系统保护的bean方法,请求将被自动传递到Acegi的方法安全性拦截器。
Configuring Acegi's method security interceptor.
配置Acegi的方法安全性拦截器。
The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.
声明方法需要通过web. xml文件和应用程序服务器特定的部署文件,来添加安全约束。
So, deployment descriptor properties such as isolation levels, access intent, security, method permissions, and so on cannot be set for such problem methods.
所以,就无法为这类问题方法设置隔离级别(isolation level)、访问目的(access intent)、安全性(security)和方法许可(method permission)等这些部署描述符属性。
应用推荐