单词 | access controls | ||||||||||||||||
释义 | access controls
更多释义 收起释义 例句释义: 存取监控,访问控制选项,访问限定 1. When used with a minimal number of systems by experienced admins, it's an adequate method of implementing role based access controls. 如果有经验的管理员在系统不多的情况下使用,它是实现基于角色访问控制的完备方法。 www.bing.com 2. Dimension data access controls which dimension attributes can be accessed by members of a role. 维度数据访问权限控制角色成员可以访问哪些维度属性。 msdn2.microsoft.com 3. Most operating systems use access controls to determine whether an entity (user or program) can access a given resource. 大多数操作系统使用访问控制来判断一个实体(用户或程序)是否能够访问给定资源。 www.ibm.com 4. The first one, the simplest to detect and handle is when the perpetrator breaches communications access controls to attack the system. 第一类,入侵者以破坏通信访问控制来攻击系统是最容易检测和处理的。 bbs.pediy.com 5. Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry. 进入控制必须包括在所有的进入点对所有雇员、来访者和卖主的积极识别。 dictsearch.appspot.com 6. While fine-grained access controls are necessary components to enable effective appliance sharing, your organization might need more. 尽管细粒度的访问控制是实现有效设备共享的必要条件,但是组织需要的可能不止这些。 www.ibm.com 7. That means that we prevent such access via access controls on our backend as well as strict policy prohibitions. 这意味着我们通过访问控制在后台阻止这样的访问,以及严格的政策禁令。 dongxi.net 8. Access Controls: Unauthorized access to the shipping, loading dock and cargo areas should be prohibited. 访问控制:未经授权进入航运,装卸码头和货物的地方应予以禁止。 zhidao.baidu.com 9. JAAS is a set of APIs that enable services to authenticate and enforce access controls upon users. JAAS是允许服务对用户进行身份验证、并强制实施访问控制的一组API。 www.ibm.com 10. Automate the installation to minimize human error; include database updates, access controls, skins, themes, and page updates. 请自动化安装,以尽可能减少人为错误;请包含数据库更新、访问控制、皮肤、主题和页面更新。 www.ibm.com 1. But an even greater innovation for Project Edition is the combination of the pricing with granular access controls. 但是ProjectEdition最为重要的一个创新是结合了访问控制的定价策略。 www.bing.com 2. Most enterprise networks require centralized authentication and access controls for all system resources. 绝大多数企业网络对所有系统资源实行中心认证和准入控制。 translations.launchpad.net 3. Reporting Services supports the following Access controls and includes them in converted report definitions. ReportingServices支持下列Access控件,并在转换报表定义中包含这些控件。 msdn2.microsoft.com 4. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. 我们有严格的政策和技术来进行访问控制,着可以使得我们的员工无法访问用户数据除极少数情况下。 dongxi.net 5. Logical access controls over infrastructure , applications, and data. 在基础设施,应用程序逻辑访问控制和数据。 blog.163.com 6. The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component. Solaris10操作系统通过其增强了安全性的TrustedExtensions组件提供了强制访问控制。 www.ibm.com 7. Ensuring appropriate access controls is done by assigning access status to both records and individuals. 为确保适当的存取控制措施,可藉由同时对档案与个人设定存取状态来完成。 www.infodoc.com.tw:8080 8. When an actions pane has focus, you access controls the same way you would access controls on a Windows Forms application. 当操作窗格具有焦点时,对控件的访问方式与在Windows窗体应用程序中访问控件的方式相同。 msdn2.microsoft.com 9. How are service access controls and change management policies governed? 服务访问控制和更改管理政策是如何治理的? www.ibm.com 10. Specifies access controls to an assembly containing. 类的程序集指定访问控制。 msdn2.microsoft.com 1. There will be several different security domains, each of which have different access controls and restrictions. 存在几种不同的安全领域,每个领域都有不同的访问控制和限制。 www.ibm.com 2. The Domino server attempts to fulfill the request while respecting access controls set by each user of who can see his busytime. 在遵守由每个可以看到其busytime的用户设置的访问控制的同时,Domino服务器尝试实现请求。 www.ibm.com 3. allow owners of used cell phones to break access controls on their phones in order to switch wireless carriers. 允许手机使用者突破控制,以便任意切换运营商。 www.macx.cn 4. You can use fine-grained access controls to define exactly which patterns they have access to deploy. 您可以使用精细的访问控制来明确定义他们所能够部署的模式是哪些。 www.ibm.com 5. There are also network access controls for sockets, network interfaces, hosts, and ports. 还有用于套接字、网络接口、主机和端口的网络访问控制。 www.ibm.com 6. To me, the addition of access controls is the primary reason to consider moving to PHP V5. 对于我来说,增加了访问控制是考虑移至PHPV5的主要原因。 www.ibm.com 7. Demonstrates how to access controls that are hosted on a Word document using managed code extensions. 演示如何使用托管代码扩展访问Word文档中承载的控件。 msdn2.microsoft.com 8. Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary. 因此,避免使用基于客户主机名的访问控制,在必须使用时限定其作用域,这些都是明智的做法。 www.ibm.com 9. Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs). GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。 www.ibm.com 10. You might consider using the ADO-based data-access controls rather than the RDO data-access controls. 您可能要考虑使用基于ADO的数据访问控件而不是RDO数据访问控件。 technet.microsoft.com 1. For now, let's put some access controls together. 现在,我们将访问控制结合在一起。 www.ibm.com 2. Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls. 第2部分将向您展示如何创建治理策略和可翻译的消息,以及如何配置访问控件。 www.ibm.com 3. You can also apply access controls to who can deploy to different cloud groups. 还可以对能够部署到不同云组的用户应用访问控制。 www.ibm.com 4. This is why there is such high demand for DB2 experts who can tighten up data access controls. 这是对能够加强数据访问控制的DB2专家具有如此高的期望的原因。 www.ibm.com 5. To access controls, properties, and functions of the master page, the, 若要访问母版页的控件、属性和函数, msdn2.microsoft.com 6. The following example demonstrates how you can use TAMOS access controls to protect against fraudulent behavior 下面的例子演示如何使用TAMOS访问控制来防范欺骗行为 www.ibm.com 7. Database access controls on financial applications not secure 财务系统的数据库访问控制不安全 wenku.baidu.com 8. Creating communities with roles and access controls 创建包含角色和访问控制的社区 www.ibm.com 9. Research and Application of Dynamic Access Controls 动态访问控制技术的研究与应用 www.ilib.cn 10. Set access controls on DNS registry entries 在DNS登录放口设置访问控制 blog.cnknow.com 1. A Survey on the Database Access Controls 数据库访问控制研究综述 www.ilib.cn |
||||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。