Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.
第二种安全策略规则类型是公开规则,它们指定在一个查询结果中可以公开哪些信息,以及公开结果对象的条件。
Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.
如果需要以更清楚的格式向安全经理报告信息,实现密码策略会非常费时间,尤其是在处理大型企业网络时。
This is the mechanism the container USES to pass security policy information to the provider.
这是容器用于将安全策略信息传递给提供程序的机制。
For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.
例如,收到一个SOAP请求时的策略,这个策略会在SOAP消息头里验证安全信息来确认用户也许可以接受先前缓存的响应数据。
Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.
现在,我们可以提取日常审计报告需要的信息,只提取与自己的审计安全策略有关的信息。
It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.
它还存储了单元的整体信息,比如单元范围的安全策略、票证有效期等。
Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.
TivoliSecurity PolicyManager——提供针对用户、用户信息联合和特权管理的统一管理点。
The new access to information policy, launched in July 2010, opens up access to all information unless specifically excepted for privacy of personal or financial security reasons.
2010年7月出台的新版信息获取政策要求公开所有信息,但出于个人隐私或金融安全等原因而不得公开的信息除外。
You also need to add WSIT custom extensions to the policy information on both client and server sides with user-configuration details to indicate how the security handling will be implemented.
您需要同时在服务器端和客户端向策略信息中添加WSDL自定义扩展,通过用户配置细节表明如何实现安全处理。
For example, the WS-Security Policy domain will be the only source of information as to whether two security assertions contradict each other or are complementary refinements of each other.
例如,WS - Security策略领域将是作为判断2个安全断言是互相矛盾的还是互为补充的唯一信息源。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
When we use third parties to assist us in processing your personal information, we require that they comply with our Privacy Policy and any other appropriate confidentiality and security measures.
当我们使用第三方协助我们处理您的个人信息时,我们要求他们遵守我们的隐私政策,以及任何其他适当的保密和安全措施。
The best security policy is to be aware of fraud and cautious about where you share personal information.
最好的安全政策,是应该意识到欺诈和谨慎那里分享你的个人信息。
For more information about how the runtime decides which permissions to grant, see Security Policy and permission Grants.
有关运行时如何决定授予的权限的更多信息,请参见安全策略和权限授予。
For more information about evidence, code groups, and permission sets, see Security Policy Model.
有关证据、代码组和权限集的更多信息,请参见安全策略模型。
Your information is protected by ZUJI's privacy and security policy.
您的资料会受到zuji私隐及安全政策保护。
For more information about using these tools, see Administering Security Policy.
有关使用这些工具的更多信息,请参见管理安全策略。
For more information, see Security Policy Model.
有关更多信息,请参见安全策略模型。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.
本文还给出了信息系统安全保障体系的规划方式,构建信息系统安全保障体系实施策略。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
For more information about default security Settings, see default security Policy.
有关默认安全设置的更多信息,请参见默认安全策略。
For more information about the evidence the common language runtime USES to determine security policy, see evidence.
有关公共语言运行时用来确定安全策略的证据的更多信息,请参见证据。
The following information applies only to Level 1 assemblies or assemblies using legacy security policy.
下面的信息仅适用于级别1程序集或使用旧安全策略的程序集。
Since this information may affect national level decisions, write a memo to the Director of Homeland Security and the Director of TSA with a technical analysis of this enhanced screening policy.
因为这些信息将影响整个国家级的决定,给国土安全局主任和TSA的主任写一份备忘录,告诉他们对强化扫描政策的技术分析。
Some of the methods require the caller to supply evidence, which is the set of information that constitutes input to security policy decisions, such as which permissions can be granted to code.
有些方法要求调用方提供证据。证据是构成安全策略决策(如哪些权限可以授予代码)的输入的一组信息。
Some of the methods require the caller to supply evidence, which is the set of information that constitutes input to security policy decisions, such as which permissions can be granted to code.
有些方法要求调用方提供证据。证据是构成安全策略决策(如哪些权限可以授予代码)的输入的一组信息。
应用推荐