This places all the files of your application into a.war file, security. war, which Geronimo reads. 这将您的应用程序的所有文件都放入一个.war文件,即security.war,Geronimo可以读取该文件。
Note that these properties will be stored in plain text and it is recommended that directory and/ or file level security be applied to protect these values. 请注意这些属性将被存储为纯文本,且我们建议采用适用于保护这些值的目录和/或文件等级安全性。
It's a good programming practice to have a separate file, security. config, that contains the entire security-related configuration. 有一个单独的文件security.config,这是一个好的编程习惯,它包含所有安全性相关的配置。
Using ACLs can aid in your file security by fine tuning access permissions, based on group membership, combined group membership, or by specific user ( s) only. 通过使用ACL,可以根据组成员关系、组合的组成员关系或只针对特定的用户精细地调整访问权限,帮助提高文件安全性。
These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system. 可以使用chmod命令修改这些权限,一般来说它们足以保证系统上大多数文件的安全性。
The test shows that the schema is indeed effective in achieving file security protection. 经测实验证,该方案确实能有效实现文件的安全保护。
The file security management is an important component of archival work, is the archival work core issue. 档案的安全管理工作是档案工作的重要组成部分,是档案工作的核心内容。
The file containing security information could not be found. 未找到包含安全信息的文件。
File resources provide reliable basis for mine production, some problems in the file security and some countermeasures are discussed. 档案资源为矿山生产发展提供了可靠的依据,试图从档案安全方面存在问题及档案管理的对策进行探讨。
The transparent encryption is a kind of document encryption technology, which emerge in recent years because of the demand of the file security of the enterprise. 透明加密技术是近年来针对企业文件保密需求应运而生的一种文件加密技术。
Method uses file access security to control access to the specified file. 方法使用文件访问安全性来控制对指定文件的访问。
File security access control is the core of the bank automatic teller machine security. 文件安全访问控制,是银行自动柜员机安全的核心部分。
Creates or overwrites the specified file with the specified buffer size, file options, and file security. 创建或改写具有指定的缓冲区大小、文件选项和文件安全性的指定文件。
File system is the core of the UNIX system. This paper gave a UNIX file security detect scheme based on distributed network. 文件系统是UNIX系统的核心,针对UNIX文件系统提出了一套基于分布式网络的UNIX文件安全检测方案。
A method of file security in CCDOS CCDOS汉字操作系统下的一种文件保密方法
ASP Implement File Security Download ASP实现文件安全下载
A File Security Mechanism in Intranet Based on File Lineage and Affinity Degree of Roles 文件血统与角色亲和度的网络文件安全机制
Evolvement Technique of File Security Lineage 文件安全性血统的演变方法
Design and Implementation of UNIX File Security Distributed Detect System 分布式UNIX文件安全检测系统的设计与实现
Realization of the File Security Contral in Linux System Kernel Linux内核中实现文件系统的安全控制
In traditional Linux make the file security through the operating system access control, if other users bypass the system access control, to the owner of the file may be disastrous impact. 传统的Linux操作系统对文件的访问控制是通过操作系统的访问控制机制来实现的,如果非法用户绕过系统的访问控制机制,对文件所有者可能将是灾难性的影响。
According to the structure and characteristic of these systems, double-level monitor mechanism is used in the file security monitor module. 文件安全监控核心模块根据此类操作系统的结构特点,使用了用户层监控和内核层监控相结合的双层监控机制。
The fourth part is the construction of the third chapter of the paper mainly introduces the project file security capability. 第四部分是针对第三章提出的课题为主介绍档案安全保障能力的建设。
How to establish an effective file security auditing system becomes enterprises 'preoccupation. From realizing perspective, most functions of the existing file security auditing systems at home and abroad are realized in the application layer. 如何在内网中建立有效的文件安全审计系统成为了众多企业的当务之急。
Launches the analysis from the aspects of file security hardware and software environment, laws and regulations, security technology, management method, standard construction, talent cultivation, points out the existing problems of every plate. 从档案保障的软硬件环境、法律法规、安全技术、管理方法、标准建设、人才培养等各方面展开分析,指出每一板块存在的不足。
The subject of the security gateway with separate equipment to achieve production networks and office networks secure connection, use file security gateway transmission mechanisms to achieve real-time data from the production network to the office network of one-way transmission. 本课题采用安全网闸隔离设备,来实现生产网络和办公网络的安全连接,利用网闸文件安全传输机制,来实现实时数据从生产网络到办公网络的单向传输。
The Chinese guiding ideology of the electronic file security management develops from a single technology to the integration of technology, from the emphasis on technology more than the management to on both the technology and the management, and from a links-style segments management to the system management. 当前我国电子文件安全管理指导思想正经历从单一技术向集成技术、重技术轻管理到技术管理并重、从环节式分段管理向系统管理演变的过程,并对未来发展趋势进行了展望。
With the development of the computer technology and the Internet, more and more information is stored and used as a form of the electronic document. Due to the openness of the electronic document, the file security incidents happened occasionally. 随着计算机和互联网技术的发展和应用,越来越多的信息以电子文档作为载体来存储和使用,由于电子文档的开放性使文件安全事件时有发生。
Chapter three discusses the practical value of "three systems" with an overview of its effects on the integration of archival resources, the instruction of the file services and the enhancement of the file security. 第三章,论述三个体系建设的实践价值,概述三个体系建设在带动档案资源整合、明确档案服务方向和加强档案安全防范方面的实际指导作用。
The second chapter elaborates the theoretical value of "three systems" respectively from the archival science, administrative science, and philosophy. Except that, it makes systematical interpretation on its theoretical value with the combination of our archival resources, the files utilization and file security. 第二章,阐述三个体系建设的理论价值,分别从档案学、行政学、哲学三个角度切入,结合我国档案资源、档案利用及档案安全的现状对其理论价值做出系统诠释。