Your security is not in your bank account but in the Lord.
你的安全并不在你的银行账户里,而在于上帝。
Identify your security objectives.
确定您的安全性目标。
Your security setup is not correct.
安全设置不正确。
Identify your security environment.
确定您的安全性环境。
Identify your security requirements.
确定您的安全性需求。
Have Your Bank Personalize Your Security controls?
让你的银行提供个人化的安全措施。
As you plan your security, you need to be aware of this.
在您规划安全性时,必须注意这些。
This can have serious implications to your security architecture.
这可能对您的安全体系结构有极大的影响。
With Netscape, look at your security icon (looks like a padlock).
用网景浏览器的话,可以查看那个类似挂锁样子的安全图标。
And as you threaten our security, your security will be threatened.
你们威胁了我们的安全,就应该感受到我们的威胁。
The choice of your security solution depends on the following needs.
安全解决方案的选择依赖于以下需求。
This allows you to clone your security features across the organization.
这使您可以跨整个组织克隆安全特性。
Your security system needn't be perfect-it just has to be better than most.
你不需要完美的安全系统——比大多数的好就可以了。
Again, evaluate your security needs and consider the use of stronger ciphers.
再次说明,请评估您的安全需要并考虑使用强度更高的密码。
Let them know your security needs and concerns, and then let them do their job.
告诉他们您的安全需求和顾虑,然后由他们解决问题。
Once you complete the export, the file you specified contains your security model.
导出完成后,指定的文件将包含安全模型。
That's a pretty clever back-out plan, if you need to reverse your security changes.
如果需要撤销安全更改,这是一个非常灵巧的撤销计划。
You should re-export and re-import your security model if you do the following.
如果执行以下操作,则需要重新导出和重新导入安全模型。
But, you need to change configuration defaults to strengthen your security posture.
但是,需要更改默认配置来增强安全性。
Just think a little bit about your security policy, especially before you adopt a new one.
您只需仔细掂量一下您的安全性策略,尤其是在计划采用新的策略之前就更应如此。
Then one can gradually lift the security of that user as your security policy demands.
以后可以根据安全策略的要求逐渐放松此用户的安全限制。
You need to select the same database when you import your security model, as shown in Figure 15.
您需要在导入安全模型时选择相同的数据库,如图15所示。
Repeat the steps you followed in this article to export, import, and enforce your security model.
重复本文中导出、导入和实施安全模型的步骤。
You may prefer another method, depending on your security requirements and personal preferences.
您可能更喜欢其他方法,具体的使用取决于安全需求和个人爱好。
You must keep both files in sync in order for the Cube Server to properly enforce your security rules.
您必须保证两个文件同步,以便CubeServer正确实施安全规则。
It also allows you to customize your security via the XML configuration files and the command line.
它还允许通过XML配置文件和命令行定制安全设置。
You now have the three GBeans and the realm set up, and your security roles and constraints are defined.
现在您已经设置了三个GBeans和领域,并且定义了您的安全角色和约束。
The login process, however, uses the Linux username to choose an SELinux user for your security context.
但是,登录进程将使用Linux用户名来为安全上下文选择SELinux用户。
Next, measure the level of business risk associated with your assets according to your security policies.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Next, measure the level of business risk associated with your assets according to your security policies.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
应用推荐