How does this relate to Web security?
这与Web安全性有什么关系呢?
Explore many aspects of web security, from specific issues to general theories.
探索Web安全的方方面面,从特定问题到一般理论。
Web security depends on vendors cooperating to improve protection for all users.
网络的安全依赖于厂商的合作以保护所有用户。
In Parts 3 and 4 of this series, we will also address dynamic pages and Web security.
在本系列的第3部分和第4部分中,我们还将解决动态页面和Web安全性问题。
The professor, who teaches Web security, asked not to be named for fear of reprisal.
这位传授网页安全的教授要求记者匿名报道以防报复。
Now the most popular web security protocol is SSL, which can be deployed in the embedded browser.
将SSL协议与嵌入式浏览器相结合即可满足安全数据传输的要求。
You've already seen a simple application that leverages the built-in Web security features of Little-G.
您已经看到一个简单的Web应用程序如何利用Little - G内置的Web安全特性。
Navigate to Security - Secure administration, applications, and infrastructure, and expand Web Security.
导航到Security-Secureadministration,applications,andinfrastructure,并展开Web Security。
If you're aware of the issues surrounding Web security in general, you shouldn't have any surprises from proxy caches.
如果你初步懂得互联网的安全机制,你不会对缓存服务器有任何。
The application of cryptography has infiltrated all the fields of social life, as in data encryption, web security, digital cash and so on.
密码学的应用已经渗透到了社会生活的各个领域,如数据加密、网络安全、电子现金等。
Web security masters can make responses betimes according to the result, and the responses can save furthest the loss under real time attacks.
网络管理员通过该结果做出及时的反应,在最大限度上降低攻击造成的损失。
Thus begins a studious and academic analysis of the fun, happy, bouncy, up-beat song "Lookin 'Out My Back Door" as it applies to the topic of Web security.
因此,我们首先从适用于Web安全性主题的方面入手,对有趣、愉快、活泼、乐观的歌曲“小心我的后门(LookinOut My Back Door)”进行认真的学术分析。
This paper discusses how to realize the system named as Bank's fingerprint web security system. It discusses the technology of SQL and ODBC and object oriented used in the system.
详细阐述了“银行网络指纹登陆系统”的实现及使用的SQL和ODBC及面向对象的编程技术等相关技术。
Some of the companies that will change the way the world uses technology won't be tech companies at all, according to Eva Chen, co-founder and CEO of a web security company called Trend Micro.
趋势科技网络安全公司创始人兼首席执行官陈怡桦(EvaChen)称,未来改变世界使用科技方式的一些公司将绝不是科技公司。
Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.
Ben还谈到了一些高级web安全需求,例如方法层的授权、定义方法安全元数据的JSR- 250规格、SpringSecurity方法元数据以及领域的访问控制等。
The state of Web security has never been pretty, and a new report from Symantec (Nasdaq: SYMC) discussing current and future threats only highlights just how risky the Internet environment has become.
万维网向来不曾安全。赛门铁克的一项最新报告讨论了当今和未来的一些网络威胁,指出国际互联网危机四伏,安全问题严峻。
The overview explains the importance of using Rational AppScan, to ensure the elimination of Web security vulnerabilities within the application development process of a public facing Web application.
概述中解释了使用RationalAppScan的重要性,即确保能够在应用程序开发过程中消除网络安全性缺陷。
This tutorial starts with an overview of Web application security.
本教程以对Web应用程序安全性的概述开始。
Next we need to create the keys and certificates for the Web services security signatures and encryption.
接下来,我们需要为Web服务安全性签名和加密创建密钥和证书。
This architecture allows us to scale the solution because the XS40 can process Web services security with very little overhead.
此体系结构使得我们可以扩展解决方案,因为XS40可以通过很小的开销来处理Web服务安全。
Step 3: Configure Web services client security extensions and bindings for UsernameToken
步骤3:为UsernameToken配置Web服务客户端安全扩展和绑定
User changes to Web services security information in the EJB deployment descriptor via the module deployment editor are now preserved.
现在,可以保留用户通过模块部署编辑器对EJB部署描述符中的Web服务安全信息的更改。
You also created a properties file realm and configured a Web application's security using that realm.
您还创建了属性文件域,并使用该域配置了Web应用程序的安全性。
Rebuilds will not corrupt nor overwrite the Web services security information.
重新构建将不会破坏或覆盖Web服务安全信息。
It therefore suffers the same scalability issues as the simple architecure using Web services security.
因此,它可提供与使用Web服务安全的简单体系结构相同的可伸缩性。
Configure Web-tier J2EE security.
配置web层j2ee安全。
Her 73 filed U.S. patents range from networking, Web, security, privacy, multimedia, wireless, pervasive devices, to radio frequency ID.
她申请的73项u.s.专利涵盖的范围从网络、Web、安全、保密、多媒体、无线、普遍设备到无线电频率ID。
Step 4: Configure Web services security extensions and bindings for validating the usernametoken.
步骤4:为验证usernametoken配置Web服务安全扩展和绑定。
Step 4: Configure Web services security extensions and bindings for validating the usernametoken.
步骤4:为验证usernametoken配置Web服务安全扩展和绑定。
应用推荐