SaaS应用程序的安全需求。
测试Web应用程序的安全配置。
这种做法通常会导致应用程序的安全性或可伸缩性降低。
Doing so typically causes an application to become either less secure or less scalable.
这个命令把应用程序的安全性部署计划部署到Geronimo。
This command deploys your application's security deployment plan to Geronimo. Geronimo indicates a successful deployment by outputting.
这一段的目的是描述如何应用AOP 技术实现应用程序的安全。
An Experience Report The goal of this section is to describe how AOP can be used to implement application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Database-level security measures including authentication and authorization might also be used to enhance application security.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
应用开发人员需要和布署人员沟通,怎么样来保证布署应用程序的安全。
Application Developers need to communicate to Deployers how the security is to be set up for the deployed application.
您还创建了属性文件域,并使用该域配置了Web应用程序的安全性。
You also created a properties file realm and configured a Web application's security using that realm.
状态的所有者负责发起转换,从而驱动应用程序的安全模型(也请参见图5)。
The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).
本系列的后续文章将谈到定制和配置应用程序的安全性,这有很多不同的方式。
The many different ways you can customize and configure the security aspects of the application will be covered in subsequent parts of this series.
如果前面没有首先部署应用程序的安全性部署计划,应用程序在这里会部署失败。
If you did not first deploy your application's security deployment plan previously, your application will fail to deploy here.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
您还应该了解一些事情,然后才可以把文档和应用程序的安全性托付给XKMS服务。
You should be aware of few things before you entrust the security of your documents and applications to the XKMS service.
此应用程序的安全性是从管理界面通过定义一个本地密码以便访问界面或运行审计时使用得到确保的。
The application can be secured from the management interface by defining a local password which will subsequently be required to access the interface or run audits.
这也就是说,处于各技术级的开发人员都必须为整个应用程序的安全性负起自己应付的责任。
That said, developers at every level of the technology stack must take personal responsibility for the security of the entire application.
我们希望确保当选择生成JSP示例代理应用程序时自动生成的示例JSP应用程序的安全。
We want to secure the sample JSP application that is automatically generated when selecting the generation of the JSP sample proxy application. To do this.
验证与业务应用程序的安全性和功能一样重要,核心的应用程序逻辑通常和验证程序混杂在一起。
As important as it is to the safety and functionality of your business applications, core application logic is often cluttered with validation routines.
作为一个展示两者不同的注意事项的示例,外部应用程序的安全考虑要比内部应用程序的严格得多。
As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.
如果您担心应用程序会影响其他应用程序的安全性,则可以马上就采取一些措施来满足这方面的需要。
If you are concerned about applications violating the security of other applications, there are steps you can take today to address these concerns.
在本文中,我们主要集中讨论MIDP应用程序的安全性挑战以及当前可用的或处于开发中的解决方案。
In this article, we'll mainly focus on the security challenges and solutions currently available or in development for MIDP applications.
LotusNotes还提供一个应用程序开发环境,其中已经建立了一个设计并跨企业部署应用程序的安全模型。
Lotus Notes also provides an application development environment with an established security model to design and deploy the application across the enterprise.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
您可以在 war_realm/dist目录中找到这个Web应用程序的安全版本,名称为petsecure.war。
You can find this secured version of the Web application in the war_realm/dist directory, called petsecure.war. Deploy this to Tomcat using
对于其他的Web应用程序,请在部署描述符里面使用security - constraint元素来规定应用程序的安全约束。
For other web applications, use a security-constraint element in the deployment descriptor.
要测试应用程序,首先要部署应用程序的安全性部署计划(在my - db - plan . xml中定义),然后部署应用程序。
To test your application, you first deploy the security deployment plan for your application, as defined in my-db-plan.xml, then you deploy your application.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
我发现,如果把追踪应用程序作为家庭公认的提高安全性的工具,而不是作为一个用于监视的秘密工具,那么青少年会更容易接受它。
I've found teens are more acceptable to tracking app when it is included as part of a family agreement to improve safety than when it is placed as a secret tool to watch them.
我发现,如果把追踪应用程序作为家庭公认的提高安全性的工具,而不是作为一个用于监视的秘密工具,那么青少年会更容易接受它。
I've found teens are more acceptable to tracking app when it is included as part of a family agreement to improve safety than when it is placed as a secret tool to watch them.
应用推荐