An optional latch bolt monitoring switch provides status and facilitates use in access control systems.
在访问控制系统里面,一个可选的碰簧销监测交换机提供的状态和帮助。
In proprietary access control systems, information about these entities and their attributes is kept in repositories.
在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。
Other costs include the office construction, the installation of security systems and access control systems, and design fees.
其他费用包括办公场地的建造、保安系统及出入控制系统的安装和设计费用。
With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.
对于版本3(自从2004年以来的最新版本),该标准已通过显式身份验证和访问控制系统进行了改进。
The main products have anti-theft intelligent building intercom systems, access control systems, alarm systems, intelligent home systems.
主要产品有智能楼宇防盗对讲系统、门禁系统、报警系统、家居智能化系统等。
Siemens VDO products for automobile chassis and bodies, such as airbags, antilock brakes and access control systems also help improve safety and security.
为汽车底盘和车身设计的产品(如安全气囊、防抱死系统和进入控制系统)还提高了汽车的安全性能。
In this paper, we designed the whole system, including digital video systems, access control systems and anti-theft alarm system. The 3 separate subsystems are also interactive.
本文首先对系统进行了总体设计,包括数字视频监控系统、门禁管理系统和防盗报警系统共三个子系统。
Once associated only with Banks, jewelry stores, or museums, access control systems are now playing a much greater role in the overall design of all types of commercial buildings.
门禁控制系统以前只有银行、珠宝商店或博物馆才涉及到,但如今它在所有类型的商业建筑的总体设计中正扮演着更加重要的角色。
As the current M1 card access control systems commonly used by crack, existing access control system security is facing a severe test, so select CPU card is the best means out of this predicament.
由于目前门禁系统常用的M1卡被破解,现有门禁系统安全面临严峻考验,选择CPU卡则是摆脱这种困境最好的手段。
This includes functions such as loading and removing classification systems, and setting up access control policies.
这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
The source data remains under the control of the source systems and is pulled on demand for federated access.
源数据仍然在源系统的控制之下,会根据需要进行提取,以进行联合访问。
Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.
尽管此设计非常简单,但它可能不够,从而导致某些类unix系统通过访问控制列表和其他机制对其进行扩展。
Some file systems support advanced security features, such as access control lists (ACLs).
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Both systems allow collecting users into groups so that access control can be done more easily without having to touch many users for each change.
两个操作系统都允许将用户分组管理以简化访问控制,以避免为众多用户分别设置权限。
They also had detailed knowledge of Siemens’s industrial-production processes and control systems, and access to the target plant’s blueprints.
他们还掌握了西门子工业生产流程和控制系统的详细资料,并可以看到目标工厂的设计图。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
A few years ago, many (if not most) shops did not have access to bug tracking systems, version control, and other such tools; it was just the developers and their IDE of choice.
几年之前,很多(如果不是大部分)团队都没有使用bug跟踪系统,版本控制,和其他类似工具;只有开发人员和他们选择的IDE。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (Access ControlList) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
Instead, NSA has long wanted operating systems to also support "mandatory access control" (MAC) mechanisms.
取而代之的,NS a长期以来一直希望操作系统同样能支持“强制访问控制(mandatory access control)”(MAC)机制。
The NSA found that most operating systems' security mechanisms, including Windows and most UNIX and Linux systems, only implement "discretionary access control" (DAC) mechanisms.
NSA发现大部分操作系统的安全机制,包括Windows和大部分UNIX和Linux系统,只实现了“选择性访问控制(discretionary access control)”(DAC)机制。
File systems on Linux, AIX, Windows, and other operating systems support access Control Lists (ACLs) to limit access to directories that contain repositories.
Windows文件系统,以及其它的操作系统的文件系统均支持Access ControlLists (ACLs),限制对包含资料库的目录的访问。
TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems.
TAMOS通过为 UNIX和Linux提供操作系统级访问控制来解决这些问题。
Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems' power to analyze and utilize that data.
个人隐私:在给予人工智能系统以分析和使用数据的能力时,人们应该拥有权力去访问、管理和控制他们产生的数据。
Figure 8 shows a protected version-control repository used to host files that only authorized people or systems should access.
图8展示了一个受保护的版本控制储存库,它用于存放只有已授权人员或系统可以访问的文件。
Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.
工作流技术广泛应用于电子政务系统中,但工作流系统中的访问控制问题却没有引起足够重视和得到有效解决。
An access control mechanism is given for the protection of the resource module in the object oriented programming systems.
给出了一种用于保护面向对象编程系统的资源模块的访问控制机制。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
In addition, the 24-hour security service, CCTV monitoring, alarm and access control precision control systems are effective in ensuring a high degree of tight security.
另外,24小时保安服务、闭路电视监控、精密警报及出入管理控制系统均有效确保高度严密的保安。
Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems 'power to analyze and utilize that data.
个人隐私:在给予人工智能系统以分析和使用数据的能力时,人们应该拥有权力去访问、管理和控制他们产生的数据。
Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems 'power to analyze and utilize that data.
个人隐私:在给予人工智能系统以分析和使用数据的能力时,人们应该拥有权力去访问、管理和控制他们产生的数据。
应用推荐