An Olympic security plan five years in the making is taking shape in Vancouver this week.
一项历时五年的奥运安保计划本周在温哥华初具雏形。
This release makes dramatic improvements in the areas of default security, ease of use, and security function.
这个版本在缺省安全性、易用性和安全功能方面进行了大幅度的改进。
Even in the relatively small number of security configurations tested for the security discussions and performance comparisons in the articles of this series, I found several problems of this type.
尽管在本系列文章中,关于对安全性讨论和性能比较进行测试的安全性配置的数目较少,但我还是发现了这种类型的几个问题。
In this sample, we will configure the security for use with the Local OS user registry.
在此示例中,我们将配置与本地操作系统用户注册表一起使用的安全设置。
I intend to devote more time to the topic of security in a future installment of this column, when hopefully progress on the security standards front has progressed.
我打算在此栏目的今后部分中投入更多时间讨论安全性的话题,到时希望在安全标准方面有所进展。
City dwellers know what this means in terms of social cohesion, safety, security, and the quality of life.
城市居民知道这对社会团结、安全、保障和生活质量意味着什么。
This TAI addresses the security vulnerabilities in the previous TAI and is preferred.
这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。
The user in this example should not be the same as the security server id (the requirement for which is a valid user in the registry).
本例中的用户不应该与安全服务器ID(要求使用注册表中的有效用户)相同。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
To say that we're annoyed at airport security doesn't capture the national emotion at this point in history.
说大家因为机场安检带来的麻烦而恼火完全没有抓住大家对于这一历史时刻的民族情感。
Because the hr cube in the existing security model does not collide with a cube in the incoming security model, the security metadata associated with this cube remains in the resulting security model.
因为现有安全模型中的hr多维数据集没有和导入安全模型中的任何多维数据集冲突,与该多维数据集关联的安全元数据保留在生成的安全模型中。
This includes the need for security in a non-authenticating environment (e.g., a stateless Web service).
这包括对非验证环境(例如,无状态的Web服务)中的安全的需求。
In this step, the SOA security team is expected to follow the Software Development Life Cycle.
在此步骤,将期望soa安全团队遵循软件开发生命周期(Soft ware Development Life Cycle)。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
Listing 10 provides some of the passwords we use in this security realm and their digests.
清单10提供了我们在这个安全领域中使用的一些密码以及它们的摘要。
But no; with all this "security," we are perhaps the most insecure nation in the history of civilized man.
其实不然;我们虽然有了这一切安全措施,但我们或许是人类文明史上最不安全的国民。
Health security has two dimensions in this agenda: one at the individual and community level, and a second at the international level.
卫生安全在本议程中涉及两个方面:一个是在个人和社区层面上,另一个是在国际层面上。
Listing 12 shows the security configuration of one of the sample applications used in this article.
清单12显示了用于本文使用的示例应用程序之一的安全配置。
This ensures the right login user credential is returned by the customized security plug-in to DB2.
这样确保定制的安全性插件将正确的登录用户凭证返回到DB2。
As I read in this thought provoking article, how helpful was security for the people in Japan who were hit by the Tsunami recently?
当我阅读这篇耐人寻味的文章时,对于那些最近遭受海啸的日本人来说安全感又有多少作用呢?
You don't need to write any specific code for security, even in a secure environment, because this plug-in runs within the WSRR application and inherits security credentials from WSRR.
您不需要编写任何特定安全代码(即使在安全环境中),因为这个插件将在WSRR应用程序内部运行,从WSRR继承安全凭据。
This provides the ability to simply drop in new extensions, such as various security extensions, without requiring modification to the user's classpath.
这提供了简单地访问新扩展的能力,例如不同的安全扩展,不需要修改用户的类路径即可实现。
In this article, we'll mainly focus on the security challenges and solutions currently available or in development for MIDP applications.
在本文中,我们主要集中讨论MIDP应用程序的安全性挑战以及当前可用的或处于开发中的解决方案。
IBM tackles this issue in the new version of DB2 with enhanced security and audit features.
ibm在db2的新版本中改进了安全和审计特性,帮助解决这个问题。
As the policy currently stands however, security is lacking, which reflects the difficulty in achieving this aim.
然而鉴于目前的政策立场,社会安全仍然缺乏,反映了要实现上述目标尚存在困难。
This service will be explained in detail in the security and user management part of this article series.
本系列的“安全性和用户管理”部分将对此服务进行详细介绍。
Retrieving these private credentials from the subject is demonstrated in a sample application with the application Scoped security realm later in this article.
在本文稍后的应用程序范围安全领域部分中,通过一个示例应用程序说明了如何从主题中检索这些私有凭据。
If the decision isn't found in the cache, then the security server is invoked to obtain the decision (this process is shown in Figure 2).
如果未在缓存中找到决策,那么会调用安全服务器来获取决策(此过程如图2所示)。
If the decision isn't found in the cache, then the security server is invoked to obtain the decision (this process is shown in Figure 2).
如果未在缓存中找到决策,那么会调用安全服务器来获取决策(此过程如图2所示)。
应用推荐