管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Some file systems support advanced security features, such as access control lists (ACLs).
根据相应的电子表格的安全设置,也可以在未进行身份验证的情况下访问电子表格提要,如工作表、列表、单元格提要。
Spreadsheet feeds, such as worksheet, list, and cell feeds, might even be accessed without authentication, depending on the security settings of the corresponding spreadsheet.
每个列表都是一个字符串,它包含针对密匙对和安全组的HTML 和元素。
Each list is a string that contains the HTML and elements for the key pairs and security groups.
密匙对和安全组的列表在循环外部创建。
The lists of key pairs and security groups are created outside the loop.
实际上,证书类型的选择应该基于理想的安全策略和企业是否准备好建立和维护一个证书撤销列表。
The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.
举例来说,根据服务对具体的隐私策略的支持或着服务提供的安全保证,可以从功能上等价的服务的列表中选出服务。
For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.
此表单的所有者可能认为表单是安全的,因为他们已经把列名限定为选择列表。
Owners of this form may be tempted to think they're safe because they've limited the column names to select lists.
这个列表是SANS学院、 MITRE以及“美国和欧洲很多顶级软件安全专家”共同合作的成果。
The list is the result of collaboration between the SANS Institute, MITRE, and “ many top software security experts in the US and Europe”.
要支持从不同线程登记侦听器,那么不管用什么机制存储和管理活动侦听器列表,这个机制都必须是线程安全的。
To support registering listeners from different threads, whatever mechanism is used to store and manage the list of active listeners must be thread-safe.
前面的检查表并不是完整的列表,从遵从性或AIXV6.1安全特性的角度来看并不全面。
The previous checklist should not be treated as a complete list and may not necessarily be comprehensive from a compliance or AIX V6.1 security features perspective.
另外,还有两个下拉列表允许选择一个密匙对和一个安全组。
In addition, there are two drop-down lists that allow you to choose a key pair and a security group.
构造函数将这些集合创建为不可修改的列表,使得它们可以安全地直接返回。
The constructor creates these collections as unmodifiable lists, making it safe to return them directly.
OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。
OmniFind can be configured to associate documents with security tokens or access control lists.
它包含一个Portlet及其相关属性列表,例如安全需求、每个Portlet的个性化和自定义需求,以及每个Portlet需要的视图类型。
It contains a list of portlets and their associated properties, such as security requirement, personalization and customization requirements per portlet, and types of views desired per portlet.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
安全组件上下文中的一个值是一个列表,包含该组件所允许的0到多个元素。
A value in the context of a security component is a list of zero or more of the elements allowed by that component.
为通知服务指定jax-rpc列表和安全设置。
Specify a jax-rpc handler list and security settings for notification service.
Web客户端需要在一定的安全原则下执行,为的是能取得个人工作列表及完成工作项。
The Web client needs to execute under a certain security principle in order to retrieve the personal work list and complete the work item.
在操作的列表中,每一次交流要么使用link来表示安全的交流,而使用form来表示不安全的交流(例如Delete操作)。
In the list of actions, each interaction is either represented as a link to denote a safe interaction or as a form to denote an unsafe interaction (such as the Delete operation).
但是如果ln是li的别名,那么这就破坏了蕴含在li定义中的类型安全承诺——它是一个整数列表,这就是泛型类型不能协变的原因。
But if ln were aliased with li, then it would break the type-safety promise implicit in the definition of li — that it is a list of integers, which is why generic types cannot be covariant.
为了使用WebSphereApplication安全性限制对您愿望列表的功能访问,请执行以下步骤。
To restrict functional access to your wishlist using WebSphere Application security.
这个列表用于匹配服务器支持的安全方法。 此外,随后在该装载点下发生系统调用时也用到该列表。
The list is used to match the security method supported by the server and employed during subsequent system calls under this mount point.
相比之下,亚洲的新兴市场大体上看起来是最安全的,占据了列表底部的六个席位。
In contrast, the Asian emerging markets generally look the safest, taking all six slots at the bottom of the table.
您还必须经常光顾邮件列表和安全性公告,同其他管理员分享您的发现,而且以某种方式把所有这一切综合到一起。
You must also constantly monitor mailing lists and security bulletins, sharing your discoveries with other administrators, and somehow synthesizing everything into a coherent whole.
这一密码列表刊登在了网站上,黑客及网络安全研究人员可自由下载。
The list was briefly posted on the Web, and hackers and security researchers downloaded it.
应该根据自己的安全需求,只使用允许列表或拒绝列表之一。
Just have one list, either an allow list or deny list depending on what your security requirements are.
表2提供了应用于插件的数据库管理器配置参数列表,并解释了它们如何应用于安全性插件。
Table 2 provides a list of the database manager configuration parameters that apply to plug-ins, and an explanation of how they apply to security plug-ins.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
应用推荐