ObjectGrid自己并不提供任何现成的安全性实现,但提供了安全性插件,以便实现您所选择的安全性机制。
ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
The services are managed for identity and compliance through proper service-level security design and implementation.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
在所有这些场景中,借助在各个消息级别上、而不是在每个连接或每个队列上操作的产品组合中添加的工具,安全性更容易实现。
Security is easier to implement in all these scenarios with tools added to the mix that operate at the level of individual messages rather than per-connection or per-queue.
功能性需求是程序为实现安全性目标所执行的功能。
Functional requirements are functions that the program performs to implement the security objectives.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
为进一步增强安全性,您还可实现登录尝试失败的日志记录。
To further increase security, you can implement logging of failed login attempts.
在项目中,安全性和设置也是可配置的,这样便可实现前面所述的访问级控制。
Security and Settings are also configurable within the project, allowing access level controls as noted above.
定制的安全性插件的实现则有待您来决定。
The implementation of a customized security plug-in is left to your discretion.
在保护数字信息时,实现全程安全性是很重要的。
When securing digital information, it is important to implement end-to-end security.
就一般程序来说,安全性实现的细节并不重要。
As far as the average program is concerned, the details of the security implementation don't matter very much.
内部安全性指安全性考虑与SOA实现中的所有活动对应。
Security from within means that security considerations are coincidental to all the activities within an SOA implementation.
HLD必须清楚地从SOA实现的总体安全性的角度说明其设想。
The HLD must serve to communicate clearly what they have in mind in terms of providing overall security for the SOA implementation.
利用WebSphereDataPowerSOA设备为支持服务虚拟化和安全性的ESB网关实现奠定了基础。
Utilizing the WebSphere DataPower SOA appliance lays the foundation for the ESB Gateway implementation with its support for service virtualization and security.
Metronome使用J 9虚拟机中的几个关键方法来实现确定的暂停时间,同时保证GC的安全性。
Metronome USES several key approaches within the J9 virtual machine to achieve deterministic pause times while guaranteeing GC's safety.
SQLServer 2008和WebSphereApplication Server都建议同时使用登录名(userID)和密码,以便实现更好的安全性。
Both SQL Server 2008 and WebSphere Application Server recommend using both a login name (User ID) and a password for better security.
可以使用HPITManagementPortfolio等工具统一各个层次的安全性以实现完全的可视性。
Tools like HP IT Management Portfolio can be used to unify the security layers for complete visibility.
演示如何实现简单安全性插件的示例?
Examples that demonstrate how to implement simple security plug-ins.
OpenSSH还提供了许多身份验证机制以实现额外的安全性。
OpenSSH also provides many authentication mechanisms for additional security.
安全性插件是按每个实例实现的,因此可以创建不同的实例,使用不同的安全性插件实现。
Security plug-ins are implemented per instance, therefore you can create different instances, and have different security plug-in implementations.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
一个重要的不同之处就是安全性实现的完整性和正确性。
One important area of difference relates to the completeness and correctness of the security implementations.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
使用GSS - API的主要优点是,通过使用这种通用API编写代码,您的实现可以与不同的安全性系统互操作。
The main advantage of using the GSS-API is that by writing to this generic API, your implementation can interoperate with various security systems.
由于复杂性是安全性的“敌人”,这种方法可以实现的安全性也是有限的。
Since complexity is the enemy of security, there is also a limit to how much security can be attained this way.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security is the most straightforward way to organize commands for security purposes.
元数据模型还与事件检验和安全性的定义和实现紧密集成。
The metadata model is also tightly integrated with the definition and implementation of the event validation and security.
在进一步改进通过即时消息传递实现的协作时,安全性肯定是一个需要关注的主题。
Security is definitely a topic for further work to improve the idea of supporting collaboration through instant messaging.
在继续阅读之前,请考虑更多的应用程序场景,除了实现URL安全性以外,这些场景还要求您对单独的类访问进行保护。
Before moving on, let's consider a couple more application scenarios that might require you to secure individual classes in addition to implementing URL security.
通过比较实现安全性的不同方式,从全新的视角描述您熟悉的平台的安全性。
Provide a fresh perspective on security on the platform you are familiar with, by comparing it to a different way of implementing security.
应用推荐