• Allowing secure access to a VM is covered in the Security section later in this article.

    本文后面安全性一节将介绍虚拟机的安全访问

    youdao

  • See the security section in the GRUB manual (see Resources) for more information on GRUB security and other aspects of GRUB.

    参阅GRUB手册安全性部分参见参考资料),了解关于 GRUB 安全性其他方面更多信息

    youdao

  • The administrator would need to have rights to sign agents on behalf of other users in the Security section of the Server document.

    管理员需要具有代表服务器文档Security区域中的其他用户代理签名权限

    youdao

  • To restrict everything under the editor controller (that is, under the relative URL editor/*), add the security section below to web.xml.erb.

    为了编辑控制位于相对URLeditor/* 下)所有内容进行限制,请将下面security section 部分添加 web.xml.erb 中。

    youdao

  • For more detailed information on creating a form-login page, see WebSphere Application Server v5 information center and look for the form login sub-section under the Security section.

    有关创建表单登录页面详细信息请参阅WebSphereApplicationServerv 5informationcenter安全部分下面表单登录那一段。

    youdao

  • The examples in this section will focus on an environment without administrative or application security enabled.

    中的示例关注一个没有启用管理应用程序安全性环境

    youdao

  • The steps to create and test the security realm with a sample application in combination with some advanced features will be discussed later in the next section.

    本文一个部分中,讨论创建安全领域使用示例应用程序结合某些高级功能进行测试步骤

    youdao

  • In the next section we set up user security over IP connectivity with SSL.

    我们使用经ssl加密的IP连接建立用户安全性

    youdao

  • You use these secure transports the same way as the ones mentioned in this section, you just have to supply some additional security properties such as certificates.

    使用这些安全传输方式的方式是一样的,仅仅需要提供额外安全属性证书

    youdao

  • This section describes potential security attack methods from an attacker or hacker.

    描述了攻击或者黑客可以使用潜在的安全攻击方法

    youdao

  • We will discuss the details of J2EE security later in the Authorization technologies section.

    我们稍后将授权技术部分中详细讨论J2EE安全性

    youdao

  • This section briefly lists the basic steps that are necessary for role-based staffing to function properly, using the commonly used LDAP security enablement.

    部分使用常用的LDAP安全支持简要列出基于角色人员分配功能正确发挥作用必需基本步骤

    youdao

  • In this section, we will discuss very briefly two of the most important techniques being used in distributed environment for security.

    非常简洁地介绍分布式环境使用重要安全技术

    youdao

  • If the EJB layer is not secured (see the next section), intruders can call an EJB directly with forged credentials, rendering the application's security meaningless.

    如果ejb安全(请参见一部分),则入侵者可以使用伪造凭证直接调用EJB,使应用程序安全性无效

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • The section Configure TLS security addresses this.

    配置TLS安全性将解决这个问题。

    youdao

  • Refer to the Restrictions section above to ensure that what you are trying to accomplish is not a DB2 restriction on how security plug-ins operate.

    参考限制小节确保操作不在db 2限制安全性插件操作的范围内。

    youdao

  • For some of the extra steps to enable security in WSRR, see the section titled 'Configure security'.

    有关启用WSRR安全性步骤请参见配置安全性”一节

    youdao

  • For some of the extra steps to enable security in WESB, see the section titled 'Configure security'.

    有关启用wesb安全性步骤请参见配置安全性”一节

    youdao

  • For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    youdao

  • Information on how to do this step can be found in the Resources section, however the following tables show the main parameters used to configure WS-Security binding and configuration for a WS-UNT.

    有关如何一步的信息可以参考资料部分找到然而以下表格显示的是用于配置WS -UNT的WS - Security绑定配置主要参数

    youdao

  • This section provides tips on debugging problems with security plug-ins.

    提供关于调试安全性插件相关问题提示

    youdao

  • Another great feature, especially for testing the security of an application, is in the Forms section of the toolbar.

    另一个重要特性尤其是测试应用程序安全性所需工具栏Forms部分

    youdao

  • This section also demonstrates how to enhance the main stub class of the secure email service to provide security features.

    部分将说明如何增强安全电子邮件服务存根提供安全功能

    youdao

  • In the next section, we discuss the problems that arise with DB2 Web Service provider security and show how to address this in WebSphere.

    在下节中我们讨论DB 2Web服务提供者安全性所引起问题展示如何WebSphere解决这些问题。

    youdao

  • This section discusses the Domino server configuration used for our case study, including the Domino Server document and Configuration document settings that are most relevant to security.

    部分讨论用于这个案例研究Domino服务器配置包括安全性相关 DominoServer文档Configuration 文档设置

    youdao

  • For a more complete reference on IPSec, you can refer to the Security Guide document in the Resources section of this article.

    有关IPSec完整的描述,可以参考本文参考资料一节中的SecurityGuide文档

    youdao

  • The next section explores the SELinux implementation and how security enforcement was transparently added to the Linux kernel.

    探讨SELinux实现以及如何安全增强透明地添加Linux内核中

    youdao

  • With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.

    了解了这些内容后,更加容易理解利用Acegi方法安全性拦截器下一节将具体介绍主题

    youdao

  • With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.

    了解了这些内容后,更加容易理解利用Acegi方法安全性拦截器下一节将具体介绍主题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定