ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.
指令表随机化(isr)技术是一种新型的保护系统免遭任何类型注入码攻击的通用方法。
I don't want [Dependency Injection] framework code smeared all through my application.
我可不想让依赖注入框架的代码散布在我的应用当中。
Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
In fact, the injection of code for crosscutting concerns is a pattern of sorts.
实际上,横切关注点代码的注入,就是一种类型的模式。
Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.
最恶劣的注入攻击形式也许是代码注入——将新代码置入正在运行的进程的内存空间,随后指示正在运行的进程执行这些代码。
Upon creation of the topic, the headline for the discussion topic will be rejected without proper encoding, thus allowing the injection of arbitrary HTML code.
一旦主题创建成功,讨论主题的标题就会立刻显示而不会做任何特定编码,这样就给注入恶意html代码留出了空间。
Getting rid of the lookup code should sound familiar: this is effectively injection of the dependency on the type being advised!
去掉查找的代码应该听起来很熟悉:这是对被通知的类型的依赖有效的注入!
Chapter 8 deals with aspect oriented programming (AOP) as it applies to dependency injection, how it aims to save on boilerplate code, and reduce the risk of errors.
第8章涉及面向方面的编程(AOP)在依赖注入中的应用,如何用AOP节省样板代码,如何减少错误的风险。
With DI, you can allow the container to inject the appropriate customer class either by configuring the container or implementing the injection in the code.
使用DI,可以通过配置容器或在代码中实现注入,让容器注入适合的客户类。
Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.
这些预防方法中,多数也可以类似地应用于预防其他类型的代码注入攻击。
Code as Configuration: These are things such as an XML file that drives a dependency injection framework.
代码作为配置:类似于驱动依赖注入框架的XML文件。
The code for the client and for the service looks like it USES some piece of magic, with the references for the service and for the callback arriving through injection from the SCA runtime.
客户端代码和服务代码看起来就像使用了某些魔法,通过来自SCA运行时注入得到了服务和传入的回调的引用。
A SQL injection vulnerability occurs when a user is able to pass SQL code directly to the application in such a way that the code will be executed in a query.
如果用户能够将SQL代码直接传递给应用程序,此代码将在一个查询中执行,那么就可能发生SQL注入攻击。
One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.
一种更常见的对Web应用程序的攻击和威胁是某种形式的代码注入,Wikipedia将其定义为。
The initialization code in Listing 2 is part of a class that uses setter injection for DI.
清单2中的初始化代码是一个类的一部分,它使用setter注入进行DI。
Spring's IOC implementation uses dependency injection to effectively "invert control" from your application code to the Spring container.
Spring的IOC实现使用依赖性注入有效地将控制从应用程序代码 “反转”到 Spring 容器。
This setting determines whether to use resource injection in the JPA Manager Bean code.
该设置决定了是否在JPAManagerBean代码中使用资源注入。
When you put references as the value of a bean's property, you are really calling the dependency injection without having to write some sort of glue code to tie components together.
当您将引用作为Bean的属性的值时,实际上就是在调用依赖项注入,并且无需编写某一类粘合代码来将组件绑定在一起。
We write flyers about everything from dependency injection to code coverage, and then regularly plaster the bathrooms all over Google with each episode, almost 500 stalls worldwide...
我们把从依赖注入到代码覆盖所有关于测试的心得体会都写下来,然后定期粘贴在Google所有的卫生间里,全球大约有500多个……。
Next, you see an example of constructor injection and how Geronimo's deployment plans define how the container injects code.
接下来,将看到构造函数注入的示例,以及Geronimo的部署计划定义容器注入代码的方式。
Again, these setters are framework induced boilerplate code. Wouldn’t it be nice if they could be avoided without the need to use Constructor injection everywhere?
毫无疑问,这些setter是框架所需的样板代码,如果不使用构造器注入也能避免这一点岂不美哉?
The focus of this article is a specific type of code injection attack: the Blind XPath injection.
本文主要介绍代码注入攻击的一种特殊类型:XPath盲注。
To protect against both XPath injection and other forms of code injection, you should check all data passed from your Web server to your backend services.
要防止XPath注入和其他形式的代码注入,应该检查所有从Web服务器传到后端服务的数据。
You need this XML code to turn on EntityManager injection in the Spring XML configuration.
您需要以下XML代码将在Spring XML配置中启用EntityManager注入。
It USES dependency injection techniques to simplify the code necessary to implement the Presentation Model and Model-View-Presenter patterns.
它使用了依赖注入技术以简化代码来实现Presentation -Model和Model - View - Presenter模式。
For example, we allow the use of source code annotations, including the standard JSR-250 injection annotations.
例如,我们允许使用源代码注释,其中包括标准的JSR- 250注入注释。
To find the problem with any SQL injection, perform source code analysis.
要发现任何SQL注入问题,可执行源代码分析。
Chapter 11 talks about clean code in the context of system-level techniques such as Dependency Injection and Aspect-Oriented Programming.
第十一章在系统级别讨论了简洁代码,如依赖注入和面向方面编程技术。
The code in Figure 5 employs parameterized SQL to stop injection attacks.
图5中的代码使用参数化s QL阻止Injection攻击。
Dependency injection is the answer to more maintainable, testable, modular code.
依赖注入是对于要求更易维护,更易测试,更加模块化的代码的答案。
应用推荐