Configure Web application security.
配置Web应用程序安全性。
Web application security enhancements
Web应用程序安全性改进
Developers and Web application security.
开发人员以及Web应用程序的安全性。
This tutorial starts with an overview of Web application security.
本教程以对Web应用程序安全性的概述开始。
Web application security consists of authentication and authorization.
Web应用程序安全包括身份验证和授权两方面。
Common web attacks protection - detecting common web application security attacks.
常见的Web攻击防护——对常见的Web应用安全攻击进行检测。
To start off with, you should always run a web application security test scan against a test website.
你通常要做的是首先对要测试的站点进行web应用安全测试扫描。
Data filtering is the cornerstone of web application security in any language and on any platform.
在任何语言跟平台中,资料过滤是网页应用程序安全性的基础。
With the rise of smart phones and similar devices, web application security has been broadened to include mobile applications.
随着智能手机和类似设备的崛起,web应用程序安全性已经扩展到包括移动应用程序。
When it comes to Web application security testing and remediation , focus on the urgent and important in your environment.
当谈到网络应用安全测试和修复,重点关注迫切和重要在您的环境。
Most organizations leave the discovery of Web application security issues to a dedicated security team, which tests the applications before they go live.
大多数机构将这个Web应用程序安全性问题的发现留给专注安全的小组来做,他们在这些应用程序生效之前进行测试。
This question has been haunting the web application security field for quite some time and rest assured that no one will ever give you a definite answer.
这个问题总是在web应用安全领域被提出,也总是没有人能给出一个确切的答案。
This article will show you what is required to create the security realms provided by Community Edition and how to use them to configure Web application security.
本文将向您展示在创建CommunityEdition提供的安全领域时所需的内容,以及如何使用它们来配置Web应用程序安全性。
This article illustrated how a desired infrastructure can be run within Community Edition, and how to configure Web application security using these security realms.
本文说明了如何在CommunityEdition内部运行所需的基础结构,以及如何使用这些安全领域来配置Web应用程序安全性。
Web application security component, which takes care of the application security, again relieving the developers (and to some extent, the application engine developers too!)
Web应用程序安全构件,它负责这个软件的安全性,再次将开发人员(在某种程度上,也是这个应用程序引擎的开发人员!)
Suffice it to say that with the introduction of the J2EE Web application security architecture, we're reaping the rewards of nearly 10 years of trial and error, and it shows.
可以说随着J2EEWeb应用程序安全体系结构的引入,我们不断从近10年的反复试验有所收获,事实也表明了这一点。
Shiro also supports some auxiliary features, such as web application security, unit testing, and multithreading support, but these exist to reinforce the above four primary concerns.
Shiro还支持一些辅助特性,如Web应用安全、单元测试和多线程,它们的存在强化了上面提到的四个要素。
In fact, the Web Application Security Consortium (WASC) estimated in early 2009 that 87% of all Web sites were vulnerable to attack (see Resources for links to more information).
事实上,Web Application SecurityConsortium (WASC)在2009年初就估计,所有Web站点中有87%是有漏洞,会被攻击的(有关更多信息,请参见参考资源中的链接)。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.
为了应对新挑战,Max和同事一起,以分布式信息流控制(DecentralizedInformation Flow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume。
Be sure to keep up with web server and application software updates, use applicable security software, require strong passwords, etc.
确保升级网站服务器和应用软件,使用应用安全软件,要求安全性高的密码等等。
If this is the case, you can be confident that the client user identity is being successfully propagated to the Web service provider application using WS-Security.
如果是这样,则可以确信客户机用户标识使用WS - Security成功传播到了Web服务提供者应用程序。
Next, you will see how the security realm created above can be used to configure security in a simple Web application.
接下来,您将看到如何使用上面创建的安全领域在简单的Web应用程序中配置安全性。
Each role must be defined in the deployment descriptor of each Web or enterprise application, and security constraints must be created to secure each authorization-controlled resource.
必须在每个Web或企业应用程序的部署描述符中定义每个角色,并且必须创建安全约束来保护每个授权控制的资源。
You can develop a Web services security policies application to allow the system administrators custom the settings for users with different roles and responsibilities.
可以开发Web服务安全策略应用程序来让系统管理员为具有不同角色和职责的用户自定义设置。
Figure 3 shows the security roles created for our sample Web application.
图3显示了为示例Web应用程序创建的安全角色。
Now that we have imported the Web application, we can modify it for security.
我们已经导入Web应用程序,现在可以针对安全性对它进行修改了。
Testing the security configuration for the Web application.
测试Web应用程序的安全配置。
When dealing with a Web application, the importance of data security cannot be overstated.
在处理Web应用程序时,数据安全性的重要性怎么强调也不过分。
To learn more about the relevance of Web services to wireless application programming and security, see the Resources section.
要了解更多Web服务与无线应用程序编程和安全性之间的关系,请参阅参考资料一节。
应用推荐