在讲解下面的顺序里,并不是真正的在编程配置时所应该使用的顺序,而是为了更好地理解"页安全(Page Security) "地实现过程和原理来采用的研究顺序。
基于8个网页-相关网页
调查一致显示,男性天黑后在街上感到安全。可参见如欣德朗和加罗法洛的著作(1978年,127页)。
Surveys consistently find that men report feeling safe on the street after dark. See, for example, Hindelang and Garofalo (1978, p.127).
Viega与McGraw在《建立安全的软件》(addison - Wesley, 2002)一书的95页提出了通过问题与答案进行密码重置的较好模型。
A good model for password resets via question and answer was proposed by Viega and McGraw on page 95 of Building Secure Software (Addison-Wesley, 2002).
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
应用推荐