This security realm example uses "MD5" with "hex."
这个安全领域示例使用了十六进制编码的MD5。
This security layer would encapsulate a Web service.
这个安全层可以封装一个Web服务。
This security restriction is to avoid cross-site scripting attacks (XSS).
这个安全限制是为了避免跨站点脚本攻击(XSS)。
This security token is the client certificate, in base64 binary-encoded form.
这个安全令牌是一个客户机证书,采用 base64二进制编码形式。
This security framework example will control the functions presented to the user.
此安全性框架示例将控制呈现给用户的功能。
This security enhancement feature supports data confidentiality and data integrity.
改进的安全特性支持数据保密性和数据完整性。
Listing 10 provides some of the passwords we use in this security realm and their digests.
清单10提供了我们在这个安全领域中使用的一些密码以及它们的摘要。
Click Show plan to see the deployment plan that will be used to deploy this security realm.
单击showPlan,以观察将用于部署这个安全领域的部署计划。
See the Using a J2EE servlet sidebar for an interesting approach to this security situation.
查看侧栏使用J2EEservlet了解实现这种安全场景的有趣方法。
You'll see what a time saver this security tool is for you-as long as the gotchas don't get you.
只要解决一些问题,您就会发现这个安全工具可以为您节省大量时间。
This security model allows administrators to restrict access to trusted origins in a very flexible way.
该安全性模型允许管理员以一种非常灵活的方式,来限制对受信任站点的访问。
The tomcat role defined in the Pluto application's web.xml file is mapped to use this security-realm.
在Pluto应用程序的web . xml文件中定义的tomcat角色被映射为使用这个security - realm。
This security includes the increased chances of being promoted and being entitled to pension after retirement.
这种保障中包含着许多被提拔的可能性和退休后有权领取养老金。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
Surely, it never occurred to Sam to wonder whether this security was costing him too much freedom and personal happiness.
确实萨姆从未思考过是否为了维持生计他牺牲了太多个人的自由和幸福。
This security framework allows NFSv4 to provide mechanisms for authentication, integrity, and privacy between clients and servers.
这个安全框架让NFSv4可以提供服务器与客户机之间的认证、完整性和隐私机制。
Nowhere has this security question come to more of a head than in the U.S., the world's largest telecommunications equipment market.
对于安全担忧,没有什么地方比美国更为严重。美国是全世界最大的电信设备市场。
This security mode, which is the default, USES a user name and password for authentication, similar to the way Linux typically works.
此安全模式是默认的,它使用用户名和密码进行验证,这类似于Linux通常工作的方式。
The best minds in the world designed this security system, And you almost beat it. The frustration must be killing you. You blew it.
这是世上最聪明的人设计的安全系统,你差一丁点儿就破解了。现在懊恼得要死吧。可惜你搞砸了。
Unfortunately, the Simple Object Access Protocol (SOAP) 1.1 did not include provisions for signing messages and thus lacks this security.
可惜的是,简单对象访问协议(Simple Object Access Protocol,SOAP) 1.1并不包括签名消息的规定,因此也无此安全性。
By this security model designing system safety management, the structure is succinct, the management is convenient, the feasibility is good.
以此安全模型设计的系统安全管理,结构简洁、管理方便,可操作性好。
This security feature provides robust protection against unwanted intrusion and provides designated users easy access to documents that they should see.
该安全特性为防止有害入侵提供了强力保护,并且能够使指定用户方便地访问其应该查看的文档。
To avoid this security warning when bringing up startapplet.html in the future, click the Always trust content from this publisher check box and select Run.
为避免将来打开startapplet.html时还出现这个安全警告,可以选中Alwaystrustcontentfromthispublisher复选框,然后选择 Run。
The use of this security architecture significantly enhances the combatant commander's ability to use precise positioning, velocity and time, in all environments.
这个安全架构的使用大大提高了作战指挥的能力,可在所有环境下快速及时的精确定位。
So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.
因此,在这样的一个模型下,必须对内网中所有实体对象进行更加全面、颗粒度更小的安全管理以及控制。
You can configure this security realm in the Community Edition-specific deployment plan geronimo-web.xml. You need to add the code from Listing 15 in geronimo-web.xml.
您可以在特定于Community Edition的部署计划geronimo - web . xml中配置该安全领域。
In order to solve this security problem, cognitive radio networks are divided into single-hop clustering structure, and cluster-head is designed to detect malicious nodes.
为了解决这个问题,将认知无线电网络分成单跳有簇头结构,通过簇头检测恶意节点。
This security problem, known as instance level security, it's very hard to solve because within a web application there are thousands of similar request that need to be validated.
这种安全问题,被认为是实例级别的安全,它非常难以解决。因为,在一个Web应用中,有成千上万条相似的请求需要被验证。
This security problem, known as instance level security, it's very hard to solve because within a web application there are thousands of similar request that need to be validated.
这种安全问题,被认为是实例级别的安全,它非常难以解决。因为,在一个Web应用中,有成千上万条相似的请求需要被验证。
应用推荐