Allowing secure access to a VM is covered in the Security section later in this article.
本文后面的安全性一节将介绍对虚拟机的安全访问。
See the security section in the GRUB manual (see Resources) for more information on GRUB security and other aspects of GRUB.
请参阅GRUB手册的安全性部分(参见参考资料),了解关于 GRUB 安全性和其他方面的更多信息。
The administrator would need to have rights to sign agents on behalf of other users in the Security section of the Server document.
管理员将需要具有代表服务器文档的Security区域中的其他用户为代理签名的权限。
To restrict everything under the editor controller (that is, under the relative URL editor/*), add the security section below to web.xml.erb.
为了对编辑器控制下(即位于相对URLeditor/* 下)的所有内容进行限制,请将下面的security section 部分添加到 web.xml.erb 中。
For more detailed information on creating a form-login page, see WebSphere Application Server v5 information center and look for the form login sub-section under the Security section.
有关创建表单登录页面的详细信息,请参阅WebSphereApplicationServerv 5informationcenter中安全部分下面的表单登录那一段。
The examples in this section will focus on an environment without administrative or application security enabled.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
The steps to create and test the security realm with a sample application in combination with some advanced features will be discussed later in the next section.
在本文的下一个部分中,将会讨论创建安全领域、并使用示例应用程序结合某些高级功能对它进行测试的步骤。
In the next section we set up user security over IP connectivity with SSL.
下一节我们将使用经ssl加密的IP连接建立用户安全性。
You use these secure transports the same way as the ones mentioned in this section, you just have to supply some additional security properties such as certificates.
使用这些安全传输的方式和本节中所讲的方式是一样的,你仅仅需要提供额外的安全属性,如证书。
This section describes potential security attack methods from an attacker or hacker.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
We will discuss the details of J2EE security later in the Authorization technologies section.
我们稍后将在授权技术部分中详细讨论J2EE安全性。
This section briefly lists the basic steps that are necessary for role-based staffing to function properly, using the commonly used LDAP security enablement.
本部分使用最常用的LDAP安全支持简要列出了基于角色的人员分配功能正确发挥作用所必需的基本步骤。
In this section, we will discuss very briefly two of the most important techniques being used in distributed environment for security.
本节将非常简洁地介绍分布式环境中使用的两种最重要的安全技术。
If the EJB layer is not secured (see the next section), intruders can call an EJB directly with forged credentials, rendering the application's security meaningless.
如果ejb层不安全(请参见下一部分),则入侵者可以使用伪造的凭证直接调用EJB,使应用程序的安全性无效。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
The section Configure TLS security addresses this.
配置TLS安全性将解决这个问题。
Refer to the Restrictions section above to ensure that what you are trying to accomplish is not a DB2 restriction on how security plug-ins operate.
请参考限制小节,以确保操作不在db 2限制的安全性插件操作的范围内。
For some of the extra steps to enable security in WSRR, see the section titled 'Configure security'.
有关启用WSRR安全性的步骤,请参见“配置安全性”一节。
For some of the extra steps to enable security in WESB, see the section titled 'Configure security'.
有关启用wesb安全性的步骤,请参见“配置安全性”一节。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Information on how to do this step can be found in the Resources section, however the following tables show the main parameters used to configure WS-Security binding and configuration for a WS-UNT.
有关如何做这一步的信息可以在参考资料部分找到,然而以下表格显示的是用于配置WS -UNT的WS - Security绑定和配置的主要参数。
This section provides tips on debugging problems with security plug-ins.
本节提供关于调试与安全性插件相关问题的提示。
Another great feature, especially for testing the security of an application, is in the Forms section of the toolbar.
另一个重要特性,尤其是测试应用程序安全性所需的,是工具栏的Forms部分。
This section also demonstrates how to enhance the main stub class of the secure email service to provide security features.
此部分还将说明如何增强安全电子邮件服务的主存根类来提供安全功能。
In the next section, we discuss the problems that arise with DB2 Web Service provider security and show how to address this in WebSphere.
在下一节中,我们讨论DB 2Web服务提供者安全性所引起的问题,并展示如何在WebSphere中解决这些问题。
This section discusses the Domino server configuration used for our case study, including the Domino Server document and Configuration document settings that are most relevant to security.
这部分讨论用于这个案例研究的Domino服务器配置,包括与安全性最相关的 DominoServer文档和Configuration 文档设置。
For a more complete reference on IPSec, you can refer to the Security Guide document in the Resources section of this article.
有关IPSec的更完整的描述,您可以参考本文参考资料一节中的SecurityGuide文档。
The next section explores the SELinux implementation and how security enforcement was transparently added to the Linux kernel.
下一节将探讨SELinux实现,以及如何将安全增强透明地添加到Linux内核中。
With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.
了解了这些内容后,就更加容易理解并利用Acegi的方法安全性拦截器,下一节将具体介绍该主题。
With this background, it will be easier to understand and utilize Acegi's method security interceptor, which is the topic of the next section.
了解了这些内容后,就更加容易理解并利用Acegi的方法安全性拦截器,下一节将具体介绍该主题。
应用推荐