ImageVerifierCode 换一换
格式:DOCX , 页数:10 ,大小:25.75KB ,
资源ID:19735185      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/19735185.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(外文翻译ASP的开发准则及安全管理Word格式文档下载.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

外文翻译ASP的开发准则及安全管理Word格式文档下载.docx

1、Let us look at some of the most important operational level and that level division guidelines :Separation of the UI code and business logic. This includes preparation coupled with the UI code, such as the use of ASP components MTS internal target it with the business logic code separation, as in a

2、different DLL.affair will be separated with the ASP page. Services ASP in certain cases beyond compare, but the components and multi-storey applications will change this situation. Components should not be dependent on the client layer to manage their affairs and business logic semantics.Will be exp

3、ressed components (use solicit and responsive components) and Web server on the same machine and / or tenor. If the use of ASP internal components of the target objects on remote machines, then all of the internal components will be available in retail form. Server client access is COM+ server, whic

4、h significantly reduced the performance and security of complicated. These markings will be lay in COM+ applications mark as library activated .ASP exist in server, ASP pages must be consistent with resource sharing rules, and remember to flexibility. Look at the following details :In the conversati

5、on, management should avoid user specific state. Keep ASP stateless and where possible to allow resources pool.Mode operation:In evaluating whether a code of business logic layer or expressed, may I ask myself: If I have to use click-phone applications to replace my ASP page, then the code are there

6、?/SPAN/PP class=Mso Normal style=TEXT-JUSTIFY: inter-ideograph; MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justifySPAN lang=EN-USFONT face=Times New Roman size=3If the answer is yes , then it could try to business logic code into machine code or user interface to help.If changed after the client code can not

7、be used, or if it is constructed with the help of the user interface, the code is expressed services layer. It ASP page, or in the internal components used ASP components. It does not belong to the operational targets of components. Understanding of the distinction between desktop and ASP clientIt w

8、as modular incumbent engine,different tables top tradition uniline ran win32 application from that asp. Key distinction generalize as follows: Thread management : ASP is a multi-client threads. This means that it can have many activities in the operation, perhaps at the same time dealing with differ

9、ent ASP page. This shows that it is not the only pseudo-objects to exclusive system users. This may be unexpected reactions, for example, into a bad habit : the object stored in ASP application variables or conversation.Security environment : ASP is the Web site of the Internet Information Services

10、5.0 implementation, a low, medium, high three separate degrees. The Web site can even have different security setup, or refuse to allow anonymous access, for customer and so on. All these have generated a lot of programs, namely, the use of different end-user account is your object.Easy rose : This

11、is not a technical issue, but Web applications provide facilities Deputy effect. Traditionally, the increase in user base for desktop applications, the number of requests carefully planned well known to the client transferred. ASP has changed the process in motion and operational, ASP-Visual Basic a

12、pplications can be conveniently opened for local or worldwide for all staff, all business partners and customers all use. This approach can be used to describe - owned super links individual e-mail users can make a tenfold increase in the base. To prepare for your applications? The only way to under

13、stand the intensity of Web sites for testing to obtain the expected value of the actual performance. Detailed information on the intensity of the test, please refer to the application life cycle section.In the use of Visual Basic ASP should target? In the context of the establishment and abolition o

14、f pages of your audience. In other words, as far as possible so that no state ASP pages only in a state of dependence conversation or temporary applications variables. Not to target storage applications in English or variables. This will lock in your conversation ASP systems, the expected value of f

15、lexibility may cancel all. In other words, the Web servers handle no more than a few dozens of users. If required, in English or applications stored content, please turn it into the data rather than objects. There are many other criteria can be observed. We recommend that you read MSDN Voices, .J.D.

16、 Meier compose the column Servin SPAN style=mso-spacerun: yes It Up. The column includes a lot of technology, practice and skills development can contribute to the expansion and reliable ASP components and applications.Not to be quoted or applications memory at conversation all the inserted object c

17、omponents are Visual Basic 6.0 cell thread, that is to say they are operating in the Inter module. This means that if the thread established targets, then the object of all resources must use the same threads. Many threads (from it Web site users) use the same examples Agency targets, raises a serie

18、s of activities, the application process may become bottlenecks.In addition, in conversation with Server .Create Object stored within the object STA to be implemented threads can be effectively linked to the current user, thus it will be the largest applications to give users a few restrictions the

19、20xN (N = number of processors).If you according to our suggest to take object stateless, are not used for storage of a client, and stored in the context of their applications. Client will be able to establish an independent, use and cancellation of their own target. This reduces the need for mainta

20、ining conversation - because they do not retain the skills unique to the state. Recommended approach is to target a state, it needs a database or other storage area to visit (such as cookies and LDAP). If applications require the use of English or the scope of the data, the data should instead deal

21、with the subject of data stored in it. The dispose of the you could begin one genera,came encapsulation versus desirable value.ASP security management :The basic concept of security managementSafety management is based on information and ASP solution to manage the security strategy has set the secur

22、ity level definition process. Including management of the response to violations of the security act. ASP can be controlled without fear of attack and ASP clients business continuity, so to be able to deal with malicious attacks could really an art.Safety management in large measure dependent on the

23、 security strategy. These strategies could produce from different sources. To be considered when designing security strategy are :Service level agreement on the definition of external customer needs external security law requires external suppliers within the ASP security strategy and security strat

24、egy in the ASP environment integrated customer circumstances, the internal / external security strategy, For each solution, ASP must be defined security strategy. The strategy should be based on the various aspects of the most reliable Hop. According to customer needs, and even the basic structure w

25、ill be very different design. Usually use three safety design:The dedicated network joint of the both asp solution and safety precautions completeness by asp proceed end-to-end Control usually,these purport asp versus proprietary basic structure subassembly possess full control,include asp and clien

26、t of compartment. Public : ASP solutions and security measures by ASP component control. Usually, this means that within the ASP is in control of its own website, but does not guarantee to provide solutions to the public network with control. However, the ASP can be used as virtual private network (

27、VPN) to carry out such technical links between ASP and client security.Mixed : the solution is a combination of the previous two. dedicated and common solutions are used. In ensuring security solutions, and also involves ASP customers.There are five dimensions of the process needed to improve the MO

28、F model : planning : planning activities including in customer requirements, as well as internal and external strategies based on the legitimate demands of the SLA security component. In a dialogue with clients at the same time, it may be necessary to establish or adjust internal security strategy. Of course we should decide whether to do so by the ASP. This resulted in a level of security planning, including all aspects of the security strategy and design (infrastructure, personnel, steps, the environment, basic contracts, etc.).Implementation : Put stratification plane e

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1