• 应用程序连接性体系结构

    Creating a secure application connectivity architecture.

    youdao

  • 启动下载部分镜像向导

    This starts the wizard that creates the installation image from the downloaded parts.

    youdao

  • 金州环保社会方面取得可喜成绩

    Quintana Roo State has achieved remarkable results in building a secure and environment-friendly society.

    youdao

  • DBSECADM可以像下面这样标签

    A security label can be created by DBSECADM as follows.

    youdao

  • DBSECADM可以像下面这样策略

    A security policy can be created by DBSECADM as follows.

    youdao

  • 简单地一个工作条目测试包含内容

    Easily assign work items for testing and inclusion to a build.

    youdao

  • 2展示SIF上下文所涉及步骤

    Figure 2 shows the steps involved in SIF's creation of a security context.

    youdao

  • CD之后Disk1启动服务器

    After you've created the installation CDs, boot the new server from Disk 1.

    youdao

  • SIF上下文调用过滤器中的其他过滤器

    SIF creates the security context and calls other filters in the filter chain.

    youdao

  • 数据库安全管理员通过策略来配置LBAC系统

    The database security administrator configures the LBAC system by creating security policies.

    youdao

  • 本文中的信息应该企业大型工作结合起来

    The information in this article should be used in conjunction with a much larger effort that is designed to create a secure enterprise.

    youdao

  • 策略之后,安全管理员全策略中的安全标签

    After creating a security policy, the security administrator creates security labels that are part of that policy.

    youdao

  • 本文中的信息应该企业这些大型工作结合起来

    The information in this article should be used in conjunction with a much larger effort of creating a secure enterprise.

    youdao

  • 此外VisualStudio扩展困难。

    Furthermore, it was even harder to create setup packages for Visual Studio extensions.

    youdao

  • 对于一个模型可能会希望技术基础策略控制

    For one model, you may wish to have security policies and controls built upon the foundation of technologies.

    youdao

  • 可以使用产生自定义安装部署演示其他目的装。

    You can use the resulting custom installation package to create installation for deployments, demonstrations, or other purposes.

    youdao

  • 他们希望他们选出来领导人现在能做事情创造就业中产阶级建安

    And they want action from their elected leaders to create jobs and restore some security for the middle class right now.

    youdao

  • 详细研究具体建议之前,我们一些时间概述系统基础技术

    Before delving into specific point-by-point recommendations, let's take a moment to outline the fundamental techniques for creating secure systems.

    youdao

  • 镜像网络服务器上,导航disk1 \setup目录

    On the network server where you created the installation image, navigate to the disk1 \ setup directory.

    youdao

  • 虽然安全特性不能担保一个安全系统但是他们全系统所必需的。

    While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories.

    youdao

  • 创建安全策略,安全管理员全标签,安全标签也是安全策略一部分。

    After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.

    youdao

  • 为了开始有效操作系统学生必须了解许多经典死锁同步问题

    There are several classic deadlock and synchronization problems the student must understand in order to begin to reason about creating secure, efficient operating systems.

    youdao

  • 详细研究具体建议之前,我们打算一些时间概述系统基础技术

    Before delving into specific point-by-point recommendations, we want to take a moment to outline the fundamental techniques for creating secure systems.

    youdao

  • 组件开发人员需要开发环境设置与生产环境类似安全机制。

    Developers who are building security components require that security be set up in their development space similar to how it will be in production.

    youdao

  • EAR部署描述符全性角色使用RoleMapping按钮

    To create the security roles in the EAR deployment descriptor, use the role Mapping button.

    youdao

  • 埃拉特此前遭受过袭击导致以色列18个月同意在边境处地方修

    Eilat has been the scene of previous attacks, leading Israel to approve the construction of a security fence along two sections of the border 18 months ago.

    youdao

  • 定义调用者等于WebSphere使用Username凭据凭据主体

    By defining the caller, you are enabling WebSphere to create the security credential and principal, using the Username token credentials.

    youdao

  • 最后实现安全解决方案时,应该考虑安全工程——用于建安全应用程序的工程方法

    Lastly, when implementing any secure solutions, one should consider security engineering — an engineering methodology to build secure applications.

    youdao

  • 策略跟踪每一个可能事件尽管很容易就会这么,但是句话叫做过犹不及

    Although it may be tempting to create audit policies that track every possible event, there is such a thing as too much of a good thing.

    youdao

  • 本文描述如何使用Geronimo应用服务器提供安全设施应用程序。

    This article has described how to use security facilities provided by the Geronimo application server to build secure applications.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定