网站首页  词典首页

请输入您要查询的英文单词:

 

单词 ACLS
释义

ACLS

美 
英 
  • abbr.(=Automatic Carrier Landing System)【军】舰载机自动着陆装置
  • 网络访问控制列表;高级生命支持(advanced cardiac life support);高级心脏救命术
abbr.
1.
【军】(=Automatic Carrier Landing System)舰载机自动着陆装置
2.
(=American Council of Learned Societies)美国学术团体理事会

例句

释义:
1.
If you're using any other backup program, be sure to do a bit of research before using extended attributes and ACLs all over the place.
如果您正在使用任何其它备份程序,请确保无论在何处使用扩展属性和ACL之前都做一些研究。
www.ibm.com
2.
as common as knee or ankle sprains, torn ACLs put players out of the game for up to a year.
虽然不像膝盖或脚踝扭伤亚囊经常出现,但是前十字交叉韧带撕裂会让运动员停赛最长达一年之久。
www.showxiu.com
3.
Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly.
由于这些对象是在公用文件夹访问控制列表(ACL)中使用的,因此,正确复制此信息是至关重要的。
technet.microsoft.com
4.
Each of these resources has several classes that you can use to create and modify ACLs.
上述每个资源都有几个用于创建和修改ACL的类。
msdn2.microsoft.com
5.
Describes the rules used to propagate ACLs to folders and files contained within a target folder.
描述用于将ACL传播到目标文件夹中包含的文件夹和文件的规则。
msdn2.microsoft.com
6.
If he had ACLs, he would have been long gone.
如果他有十字韧带,他就不会跌这么后了。
chinaspurs.com
7.
Folder access control lists ( ACLs ) will not be preserved when recovering content into an active mailbox .
将内容恢复到活动邮箱中时,不会保留文件夹访问控制列表(ACL)。
www.bing.com
8.
You can replicate ACLs as an entire list, not just individual entries, to remote copies of the database.
可以把整个ACL列表(而不是单独的项)复制到数据库的远程副本中。
www.ibm.com
9.
In the authorization and authentication areas of the client, you can add, modify, or delete users, user groups, privilege sets, and ACLs.
在该客户机的authorizationandauthenticationareas中,可以添加、修改或删除用户、用户组、权限集和ACL。
www.ibm.com
10.
As you saw in " Users, user groups, and ACLs in CM V8, " CM provides default values for most of them.
如“CMV8中的用户、用户组和ACL”一节所述,CM为大部分用户属性提供了缺省值。
www.ibm.com
1.
Access Control Lists (ACLs) determining who can access each database and to what extent.
访问控制列表(AccessControlList,ACL)确定谁能在多大范围内访问每个数据库。
www.ibm.com
2.
For a complete list of all of the get and set methods for each protected resource, see Technology Summary for ACLs.
有关每个受保护资源的所有get和set方法的完整列表,请参见ACL技术摘要。
msdn2.microsoft.com
3.
From the point of view of the individual ACLs securing the resources, this is exactly correct.
从保护资源安全的各个ACL的角度来看,这是完全正确的。
www.ibm.com
4.
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
访问控制列表(ACL)是具有所有者和索引列表或散列的对象,如图2所示。
www.ibm.com
5.
CM uses privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
CM使用权限、权限组、权限集合和ACL对用户进行授权,从而对特定项目执行特定操作。
www.ibm.com
6.
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
这些属性包括文件所有者及组权限,访问控制列表(ACL),以及扩展文件属性。
www.ibm.com
7.
The service access control list (ACLs) settings for front-end servers are identical to the service ACLs settings for back-end servers.
前端服务器的服务访问控制列表(ACL)设置与后端服务器的服务ACL设置完全相同。
technet.microsoft.com
8.
Provides the ability to control access to directory objects without direct manipulation of Access Control Lists (ACLs).
提供无需直接操作访问控制列表(ACL)而控制对目录对象的访问的能力。
msdn2.microsoft.com
9.
Review operating system security and Windows access control lists (ACLs) on the server that hosts the custom server controls.
查看承载自定义服务器控件的服务器上的操作系统安全性和Windows访问控制列表(ACL)。
msdn2.microsoft.com
10.
These ACLs are also set on the directory itself, but they include Modify permissions for the CREATOR OWNER group.
这些ACL还会在该目录本身上设置,但是它们包括CREATOROWNER组的“修改”权限。
msdn2.microsoft.com
1.
These ACLs are also set on the directory itself, but they include Modify permissions for the Power Users group.
这些ACL还会在该目录上设置,但是它们包括PowerUsers组的修改权限。
msdn2.microsoft.com
2.
In this case, the. NET Framework creates the needed key and related container with the ACLs of the current user.
在这种情况下,.NETFramework会创建所需的密钥及带有当前用户ACL的相关容器。
msdn2.microsoft.com
3.
The administrative users are able to execute all the data modeling operations like itemtype creation, defining ACLs, and so on.
管理用户能执行所有数据建模操作,例如项目类型创建、定义ACL,等等。
www.ibm.com
4.
To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces.
要过滤网路讯务,ACL决定可被绕送的封包在路由器介面上是否要被传送或阻隔。
dictsearch.appspot.com
5.
This module provides authorization services against file-system access-control lists (ACLs).
此模块提供针对文件系统访问控制列表(ACL)的授权服务。
msdn2.microsoft.com
6.
Writing event handlers and service methods that will interpret changes in the UI and modify ACLs and the registry accordingly.
编写将用于解释UI中的更改并相应修改ACL和注册中心的事件处理程序和服务方法。
www.ibm.com
7.
Yes, extended attributes and ACLs are really fun, but beware -- most backup programs currently still ignore EA and ACL data.
是的,扩展属性和ACL的确很有趣,但是,当心―大多数备份程序目前仍然忽略EA和ACL数据。
www.ibm.com
8.
It also helps you secure the connection string information using access control lists (ACLs) and encryption.
此外,还可以帮助您使用访问控制列表(ACL)和加密保护连接字符串信息。
msdn2.microsoft.com
9.
The class members are concluded by defining the ACLs that provide authorization for each of the spaces you will test.
类成员以定义ACL结束,用于为您将测试的各个空间提供授权。
www.ibm.com
10.
Listing 4 shows the Junit test that generates and prints out an aclActorTable showing configuration information for a list of ACLs.
清单4显示了Junit测试,该测试可以生成并输出显示一组ACL的配置信息的aclActorTable。
www.ibm.com
1.
The following table lists the ACLs that should be set on application-level. Browser files in the App_Browsers subdirectory.
下表列出了应该在App_Browsers子目录中的应用程序级别的.browser文件上设置的ACL。
msdn2.microsoft.com
2.
Active Directory uses a protection mechanism to make sure that ACLs are set correctly for members of sensitive groups.
ActiveDirectory使用保护机制来确保为敏感组中的成员正确设置ACL。
support.microsoft.com
3.
At the organizational unit level, remove inheritance and then set the permissions to match the current ACLs on the adminSDHolder container.
在组织单位级别,删除继承然后将权限设置为与adminSDHolder容器上当前的ACL相匹配。
support.microsoft.com
4.
Configure event monitoring and enable warnings generated when database ACLs are changed.
需要配置更改数据库ACL时生成的事件监控和警告。
www.ibm.com
5.
The ACLs can be inherited from the folder where the file is created.
ACL可以从创建该文件的文件夹继承。
msdn2.microsoft.com
6.
Operating system security and access control lists (ACLs) on the server that hosts the custom server control.
承载自定义服务器控件的服务器上的操作系统安全性和访问控制列表(ACL)。
msdn2.microsoft.com
7.
For most scenarios, you can use the higher level, abstracted classes instead of the advanced classes to create and modify ACLs.
对于大多数情况,您可以使用较高级别的抽象类(而不是使用高级类)来创建和修改ACL。
msdn2.microsoft.com
8.
CM uses privilege sets and ACLs to provide a stringent and granular authorization mechanism.
CM使用权限集合和ACL提供了一种严格的粒度级授权机制。
www.ibm.com
9.
The directory should be protected with highly restrictive ACLs.
该目录应利用高限制级ACL进行保护。
technet.microsoft.com
10.
In my next article, we'll also take a look at some of XFS' advanced features, such as ACLs and extended attributes.
在下一篇文章中,我们还将研究XFS的一些高级特性,譬如ACL和扩展属性。
www.ibm.com
1.
If the acls argument is set to true, the current users' permissions on each resource are returned.
如果acls参数设置为true,那么会返回当前用户在每个资源上的许可。
www.ibm.com
2.
ACLs are outside the scope of this article, so everything we'll upload will be granted public, read-only access.
ACL不属于本文介绍的范围,所以我们所上传的所有文件都会授予公开的只读访问权限。
www.ibm.com
3.
File permissions and ACLs can be monitored and fixed.
可以监控和修改文件许可权和ACL。
www.ibm.com
4.
To mitigate this threat, maintain strong ACLs on browser definition files.
为了减轻该威胁,请在浏览器定义文件上保持强ACL。
msdn2.microsoft.com
5.
Define a transformation of access rights (ACLs, privilege sets).
定义访问权限(ACL,权限集)的转换。
www.ibm.com
6.
Modify the ACLs on the application databases to give users author access only.
修改应用程序数据库上的ACL,只赋予用户作者权限。
www.ibm.com
7.
Select the Propagate ACLs check box to allow descendants without an explicitly defined ACL to inherit from this entry.
选择PropagateACLs复选框,允许没有明确定义ACL的后代能从这个条目中继承。
www.ibm.com
8.
For more information, see ASP. NET Required Access Control Lists (ACLs).
有关更多信息,请参见ASP.NET必需的访问控制列表(ACL)。
msdn2.microsoft.com
9.
You can use ADSI Edit to view and modify the ACLs for Send connectors and Receive connectors.
可以使用ADSI编辑查看和修改发送连接器和接收连接器的ACL。
technet.microsoft.com
10.
The earliest forms of access control on the mainframe were based on manually maintained access control lists (ACLs).
在大型机上最早的访问控制方式是基于手动维护的访问控制列表(ACLs)。
www.infoq.com
1.
The ACLs are defined on the connector object in Active Directory or ADAM.
ACL是针对ActiveDirectory或ADAM中的连接器对象定义的。
technet.microsoft.com
2.
Not all users in the ACLs are also firewall users or administrators.
并不是ACL中的所有用户都是防火墙用户或管理员。
www.ibm.com
3.
Sometimes you need to programmatically change the ACLs of an existing file or folder.
有时候,您需要以编程方式更改现有文件或文件夹的ACL。
msdn2.microsoft.com
4.
Access control lists (ACLs) can have a mixture of users from different authentication providers.
访问控制列表(ACL)可以包含来自不同验证提供程序的用户。
office.microsoft.com
5.
Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).
GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。
www.ibm.com
6.
The main responsibility of a firewall is to block access in more complex manner than that provided by ACLs.
防火墙的主要职责是提供一种比ACL更为复杂的访问阻塞方式。
dict.ebigear.com
7.
This scenario describes how to modify the ACLs for an existing file or folder using the managed ACL classes.
该方案描述如何使用托管ACL类修改现有文件或文件夹的ACL。
msdn2.microsoft.com
8.
ACLs authorize or deny actions for the ACLHolders they protect.
ACL授权或拒绝对它们所保护的ACLHolder的操作。
www.ibm.com
9.
This scenario describes how to specify the ACLs for a new file or folder using the managed ACL classes.
该方案描述如何使用托管ACL类为新文件或文件夹指定ACL。
msdn2.microsoft.com
10.
For directory object ACLs, the nonobject ACEs come before object ACEs.
对于目录对象的ACL,非对象ACE优先于对象ACE。
msdn2.microsoft.com
1.
Listing 4 is a sample configuration file defining ACLs.
清单4是定义了ACL的一个示例配置文件。
www.ibm.com
2.
ACLs have certain default actions (or permissions) associated with them, but, if necessary, we can create a custom action group.
ACL具有与其关联的特定缺省操作(或权限),但如有必要,可以创建自定义操作组。
www.ibm.com
3.
But ACLs are only half the story of authorization.
但是,ACL只是授权过程的一部分。
www.ibm.com
4.
Microsoft SQL Server Express mountable files must be properly secured by access control lists (ACLs) and SQL authentication.
必须通过访问控制列表(ACL)和SQL身份验证来正确地保护MicrosoftSQLServerExpress可装载文件。
msdn2.microsoft.com
5.
Check the access control lists (ACLs) on the files under '%1' and make sure the Microsoft Exchange Transport service can access them.
请检查“%1”下各文件的访问控制列表(ACL),确保MicrosoftExchange传输服务可以访问它们。
www.microsoft.com
6.
Use file system ACLs instead of rules based on canonical file names.
请使用档案系统ACL,而不是根据标准档案名称的规则。
technet.microsoft.com
7.
This is the maximum privilege a user has on any CM entity like itemtypes, items, ACLs, processes, worknodes, and so on.
这是用户对任何CM实体(如项目类型、项目、ACL、处理、工作节点等)所拥有的最大权限。
www.ibm.com
8.
ACLs An ACL declaration creates and initializes a named access control list which can later be used to match client addresses:
ACL声明创建并初始化一个命名的访问控制列表,稍后可用于客户端地址相匹配:
blog.sina.com.cn
9.
Let's take a look at how to add users, privilege sets, and ACLs to an administrative domain
让我们看一下如何向管理域添加用户、权限集合和ACL。
www.ibm.com
10.
ACLS Automatic Control and Landing System
自动控制和着陆系统
blog.sina.com.cn
1.
You need to make sure all your expected network service are not blocked by these ACLs
你需要确定你的需要的网络服务中不备访问控制列表要堵塞
blog.sina.com.cn
2.
Define the combination of multiple ACLs
定义多条访问控制列表的组合
wenku.baidu.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/10 9:16:27