• For now, let's put some access controls together.

    现在我们访问控制结合在一起

    youdao

  • Creating communities with roles and access controls.

    创建包含角色访问控制的社区

    youdao

  • How are service access controls and change management policies governed?

    服务访问控制更改管理政策如何治理的?

    youdao

  • Best way to access controls on parent page from a child page popup?

    一个孩子页面弹出访问页面控件最佳方式

    youdao

  • You can also apply access controls to who can deploy to different cloud groups.

    可以能够部署不同的用户应用访问控制

    youdao

  • There are also network access controls for sockets, network interfaces, hosts, and ports.

    还有用于套接字网络接口主机端口的网络访问控制

    youdao

  • To me, the addition of access controls is the primary reason to consider moving to PHP V5.

    对于我来说增加访问控制考虑PHP V5主要原因

    youdao

  • Figure 1: Sample communities, roles, and access controls for a new service creation project.

    1一个新的服务创建项目社区角色访问控制

    youdao

  • Likewise, changes to access controls require changes to built-in access mechanism in the core layer.

    类似地访问控制更改要求更改核心层中的内置访问机制

    youdao

  • You can use fine-grained access controls to define exactly which patterns they have access to deploy.

    可以使用精细访问控制明确定义他们能够部署模式哪些

    youdao

  • There will be several different security domains, each of which have different access controls and restrictions.

    存在几种不同安全领域每个领域都不同访问控制限制

    youdao

  • That means that we prevent such access via access controls on our backend as well as strict policy prohibitions.

    意味着我们通过访问控制后台阻止这样的访问,以及严格政策禁令

    youdao

  • The following example demonstrates how you can use TAMOS access controls to protect against fraudulent behavior.

    下面例子演示如何使用TAMOS访问控制防范欺骗行为

    youdao

  • Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls.

    第2部分展示如何创建治理策略可翻译消息以及如何配置访问控件

    youdao

  • Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.

    大多数操作系统使用访问控制判断一个实体(用户程序)是否能够访问给定资源

    youdao

  • Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.

    很多这样访问控制都会带来一个问题因为利用程序能够继承用户的访问控制。

    youdao

  • Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).

    GoogleStorage值得花精力的,这主要是因为支持通过访问控制列表(acl)实现的强大访问控制

    youdao

  • Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry.

    访问控制必须包括所有员工访港旅客身份所有入境供应商

    youdao

  • Automate the installation to minimize human error; include database updates, access controls, skins, themes, and page updates.

    自动化安装尽可能减少人为错误请包含数据库更新访问控制皮肤主题页面更新。

    youdao

  • The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.

    Solaris10操作系统通过增强了安全性的 TrustedExtensions 组件提供了强制访问控制

    youdao

  • Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets.

    访问控制防止未经授权进入设施保持员工旅客控制保护公司资产

    youdao

  • Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary.

    因此避免使用基于客户主机名的访问控制在必须使用限定其作用域这些明智做法。

    youdao

  • Often, the target is created when the consolidation pattern is first applied so that no access controls preexist and possibly need to be defined.

    通常首次应用整合模式创建目标这样存在任何访问控制所以可能需要其进行定义。

    youdao

  • In Part 2 of this article series, you will learn how to create governance policies and translatable messages, and how to configure access controls.

    系列文章第2部分了解如何创建治理策略可翻译消息以及如何配置访问控件

    youdao

  • The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.

    用户必须用户出口路径配置目录使用主机系统文件访问控制确保容易受到攻击

    youdao

  • Access controls to all your content, determine what's public, what's private, what's viewable by friends, family, co-workers or members of another group.

    控制所有内容,可以选择哪些公开,哪些保密好友家人同事分别可以看到哪些内容。

    youdao

  • Configure the synchronization process, create the replication store, and define subscriptions and access controls using Mobile Device Administrator Center.

    通过使用移动设备管理中心(Mobile Device Administration Center, MDAC)配置同步进程创建复制存储以及定义订阅访问控制

    youdao

  • This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.

    事实上证书可能会散放某人工作站移动电脑上,并且提供物理访问控制非常小,进一步复杂化了问题。

    youdao

  • This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.

    事实上证书可能会散放某人工作站移动电脑上,并且提供物理访问控制非常小,进一步复杂化了问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定