• Creating communities with roles and access controls.

    创建包含角色访问控制的社区

    youdao

  • There are also network access controls for sockets, network interfaces, hosts, and ports.

    还有用于套接字网络接口主机端口的网络访问控制

    youdao

  • To me, the addition of access controls is the primary reason to consider moving to PHP V5.

    对于我来说增加访问控制考虑PHP V5主要原因

    youdao

  • Figure 1: Sample communities, roles, and access controls for a new service creation project.

    1一个新的服务创建项目社区角色访问控制

    youdao

  • Likewise, changes to access controls require changes to built-in access mechanism in the core layer.

    类似地访问控制更改要求更改核心层中的内置访问机制

    youdao

  • You can use fine-grained access controls to define exactly which patterns they have access to deploy.

    可以使用精细访问控制明确定义他们能够部署模式哪些

    youdao

  • There will be several different security domains, each of which have different access controls and restrictions.

    存在几种不同安全领域每个领域都不同访问控制限制

    youdao

  • That means that we prevent such access via access controls on our backend as well as strict policy prohibitions.

    意味着我们通过访问控制后台阻止这样的访问,以及严格政策禁令

    youdao

  • The following example demonstrates how you can use TAMOS access controls to protect against fraudulent behavior.

    下面例子演示如何使用TAMOS访问控制防范欺骗行为

    youdao

  • Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls.

    第2部分展示如何创建治理策略可翻译消息以及如何配置访问控件

    youdao

  • Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.

    大多数操作系统使用访问控制判断一个实体(用户程序)是否能够访问给定资源

    youdao

  • Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.

    很多这样访问控制都会带来一个问题因为利用程序能够继承用户的访问控制。

    youdao

  • Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).

    GoogleStorage值得花精力的,这主要是因为支持通过访问控制列表(acl)实现的强大访问控制

    youdao

  • Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry.

    访问控制必须包括所有员工访港旅客身份所有入境供应商

    youdao

  • Automate the installation to minimize human error; include database updates, access controls, skins, themes, and page updates.

    自动化安装尽可能减少人为错误请包含数据库更新访问控制皮肤主题页面更新。

    youdao

  • The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.

    Solaris10操作系统通过增强了安全性的 TrustedExtensions 组件提供了强制访问控制

    youdao

  • Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets.

    访问控制防止未经授权进入设施保持员工旅客控制保护公司资产

    youdao

  • Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary.

    因此避免使用基于客户主机名的访问控制在必须使用限定其作用域这些明智做法。

    youdao

  • Often, the target is created when the consolidation pattern is first applied so that no access controls preexist and possibly need to be defined.

    通常首次应用整合模式创建目标这样存在任何访问控制所以可能需要其进行定义。

    youdao

  • In Part 2 of this article series, you will learn how to create governance policies and translatable messages, and how to configure access controls.

    系列文章第2部分了解如何创建治理策略可翻译消息以及如何配置访问控件

    youdao

  • The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.

    用户必须用户出口路径配置目录使用主机系统文件访问控制确保容易受到攻击

    youdao

  • Access controls to all your content, determine what's public, what's private, what's viewable by friends, family, co-workers or members of another group.

    控制所有内容,可以选择哪些公开,哪些保密好友家人同事分别可以看到哪些内容。

    youdao

  • Configure the synchronization process, create the replication store, and define subscriptions and access controls using Mobile Device Administrator Center.

    通过使用移动设备管理中心(Mobile Device Administration Center, MDAC)配置同步进程创建复制存储以及定义订阅访问控制

    youdao

  • This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.

    事实上证书可能会散放某人工作站移动电脑上,并且提供物理访问控制非常小,进一步复杂化了问题。

    youdao

  • WebSphere CloudBurst provides both permission and fine-grained access controls that together help to govern which users can take which actions on which resources.

    WebSphereCloudBurst提供了权限精细访问控制,它们可以一起帮助管理哪些用户能够处理哪些资源

    youdao

  • And in this case, I can only access it programmatically, because the default access controls associated with everything are set to deny any noncredentialed access to it.

    例中只能通过编程方式访问它,因为所有内容关联默认访问控制设置拒绝任何授权访问)。

    youdao

  • This allows you to add a layer of organizational governance to your WebSphere CloudBurst pattern deployment process that goes beyond permission and fine-grained access controls.

    允许WebSphereCloudBurst模式部署过程权限精细访问控制之外增加组织管理

    youdao

  • Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.

    近几年产生基于数字证书认证基于角色访问控制具有安全性高、管理灵活特征对于加强系统安全性有应用前景

    youdao

  • Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.

    近几年产生基于数字证书认证基于角色访问控制具有安全性高、管理灵活特征对于加强系统安全性有应用前景

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定