网站首页  词典首页

请输入您要查询的英文单词:

 

单词 access controls
释义

access controls

  • 网络存取监控;访问控制选项;访问限定
1.
存取监控
...实体安全 (Physical Security) 存取监控 (Access Controls) 人员安全 (Personnel Security) 教育训练 (Education and Training A...
wenku.baidu.com
2.
访问控制选项
9.5.1 配置Squid... ... TIMEOUTS: 超时定义选项。 ACCESS CONTROLS访问控制选项。 ADMINISTRATIVE PARAMETE…
book.51cto.com
3.
访问限定
高效配置L,配置服务器失败... ... 9.ADMINISTRATIVE PARAMETERS( 管理参数) 8.ACCESS CONTROLS( 访问限定) 7.TIMEO…
www.usa-idc-cn.com
4.
访问控制部分
... # TIMEOUTS( 超时) # ACCESS CONTROLS访问控制部分) # OPTIONS FOR EXTERNAL SUPPORT PROGRAMS( …
linux.chinaunix.net
5.
实体存取控制
... ●风险稽核法( The Risk-Based Audit Approach) 3、实体存取控制Access Controls) 2、原始资料控制( Source Dat…
www.kjlww.com
6.
接触控制
违反防盗拷措施之行为态样:分为「直接规避接触控制access controls)措施之行为」与「准备行为」二类。 防盗拷措施规 …
ccnet.km.nccu.edu.tw
7.
控制之防盗拷措施
控制之防盗拷措施(access controls),可能可该当刑法第三百五十八条所规范之
nccur.lib.nccu.edu.tw
8.
通道控制
国际标... ... 实验室楼层平面图 Laboratory floor plans 通道控制 Access controls 成文的清洁方法 Documented cleaning method…
www.westyx.com

例句

释义:
1.
When used with a minimal number of systems by experienced admins, it's an adequate method of implementing role based access controls.
如果有经验的管理员在系统不多的情况下使用,它是实现基于角色访问控制的完备方法。
www.bing.com
2.
Dimension data access controls which dimension attributes can be accessed by members of a role.
维度数据访问权限控制角色成员可以访问哪些维度属性。
msdn2.microsoft.com
3.
Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.
大多数操作系统使用访问控制来判断一个实体(用户或程序)是否能够访问给定资源。
www.ibm.com
4.
The first one, the simplest to detect and handle is when the perpetrator breaches communications access controls to attack the system.
第一类,入侵者以破坏通信访问控制来攻击系统是最容易检测和处理的。
bbs.pediy.com
5.
Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry.
进入控制必须包括在所有的进入点对所有雇员、来访者和卖主的积极识别。
dictsearch.appspot.com
6.
While fine-grained access controls are necessary components to enable effective appliance sharing, your organization might need more.
尽管细粒度的访问控制是实现有效设备共享的必要条件,但是组织需要的可能不止这些。
www.ibm.com
7.
That means that we prevent such access via access controls on our backend as well as strict policy prohibitions.
这意味着我们通过访问控制在后台阻止这样的访问,以及严格的政策禁令。
dongxi.net
8.
Access Controls: Unauthorized access to the shipping, loading dock and cargo areas should be prohibited.
访问控制:未经授权进入航运,装卸码头和货物的地方应予以禁止。
zhidao.baidu.com
9.
JAAS is a set of APIs that enable services to authenticate and enforce access controls upon users.
JAAS是允许服务对用户进行身份验证、并强制实施访问控制的一组API。
www.ibm.com
10.
Automate the installation to minimize human error; include database updates, access controls, skins, themes, and page updates.
请自动化安装,以尽可能减少人为错误;请包含数据库更新、访问控制、皮肤、主题和页面更新。
www.ibm.com
1.
But an even greater innovation for Project Edition is the combination of the pricing with granular access controls.
但是ProjectEdition最为重要的一个创新是结合了访问控制的定价策略。
www.bing.com
2.
Most enterprise networks require centralized authentication and access controls for all system resources.
绝大多数企业网络对所有系统资源实行中心认证和准入控制。
translations.launchpad.net
3.
Reporting Services supports the following Access controls and includes them in converted report definitions.
ReportingServices支持下列Access控件,并在转换报表定义中包含这些控件。
msdn2.microsoft.com
4.
We have strict policy and technical access controls that prohibit employee access except in these rare circumstances.
我们有严格的政策和技术来进行访问控制,着可以使得我们的员工无法访问用户数据除极少数情况下。
dongxi.net
5.
Logical access controls over infrastructure , applications, and data.
在基础设施,应用程序逻辑访问控制和数据。
blog.163.com
6.
The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.
Solaris10操作系统通过其增强了安全性的TrustedExtensions组件提供了强制访问控制。
www.ibm.com
7.
Ensuring appropriate access controls is done by assigning access status to both records and individuals.
为确保适当的存取控制措施,可藉由同时对档案与个人设定存取状态来完成。
www.infodoc.com.tw:8080
8.
When an actions pane has focus, you access controls the same way you would access controls on a Windows Forms application.
当操作窗格具有焦点时,对控件的访问方式与在Windows窗体应用程序中访问控件的方式相同。
msdn2.microsoft.com
9.
How are service access controls and change management policies governed?
服务访问控制和更改管理政策是如何治理的?
www.ibm.com
10.
Specifies access controls to an assembly containing.
类的程序集指定访问控制。
msdn2.microsoft.com
1.
There will be several different security domains, each of which have different access controls and restrictions.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
www.ibm.com
2.
The Domino server attempts to fulfill the request while respecting access controls set by each user of who can see his busytime.
在遵守由每个可以看到其busytime的用户设置的访问控制的同时,Domino服务器尝试实现请求。
www.ibm.com
3.
allow owners of used cell phones to break access controls on their phones in order to switch wireless carriers.
允许手机使用者突破控制,以便任意切换运营商。
www.macx.cn
4.
You can use fine-grained access controls to define exactly which patterns they have access to deploy.
您可以使用精细的访问控制来明确定义他们所能够部署的模式是哪些。
www.ibm.com
5.
There are also network access controls for sockets, network interfaces, hosts, and ports.
还有用于套接字、网络接口、主机和端口的网络访问控制。
www.ibm.com
6.
To me, the addition of access controls is the primary reason to consider moving to PHP V5.
对于我来说,增加了访问控制是考虑移至PHPV5的主要原因。
www.ibm.com
7.
Demonstrates how to access controls that are hosted on a Word document using managed code extensions.
演示如何使用托管代码扩展访问Word文档中承载的控件。
msdn2.microsoft.com
8.
Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary.
因此,避免使用基于客户主机名的访问控制,在必须使用时限定其作用域,这些都是明智的做法。
www.ibm.com
9.
Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).
GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。
www.ibm.com
10.
You might consider using the ADO-based data-access controls rather than the RDO data-access controls.
您可能要考虑使用基于ADO的数据访问控件而不是RDO数据访问控件。
technet.microsoft.com
1.
For now, let's put some access controls together.
现在,我们将访问控制结合在一起。
www.ibm.com
2.
Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls.
第2部分将向您展示如何创建治理策略和可翻译的消息,以及如何配置访问控件。
www.ibm.com
3.
You can also apply access controls to who can deploy to different cloud groups.
还可以对能够部署到不同云组的用户应用访问控制。
www.ibm.com
4.
This is why there is such high demand for DB2 experts who can tighten up data access controls.
这是对能够加强数据访问控制的DB2专家具有如此高的期望的原因。
www.ibm.com
5.
To access controls, properties, and functions of the master page, the,
若要访问母版页的控件、属性和函数,
msdn2.microsoft.com
6.
The following example demonstrates how you can use TAMOS access controls to protect against fraudulent behavior
下面的例子演示如何使用TAMOS访问控制来防范欺骗行为
www.ibm.com
7.
Database access controls on financial applications not secure
财务系统的数据库访问控制不安全
wenku.baidu.com
8.
Creating communities with roles and access controls
创建包含角色和访问控制的社区
www.ibm.com
9.
Research and Application of Dynamic Access Controls
动态访问控制技术的研究与应用
www.ilib.cn
10.
Set access controls on DNS registry entries
在DNS登录放口设置访问控制
blog.cnknow.com
1.
A Survey on the Database Access Controls
数据库访问控制研究综述
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/13 5:31:42