For example, in an application that is tightly tied to a database, many methods may need to access the database.
例如,在与数据库有紧密联系的应用程序中,程序的很多方法可能都需要访问数据库。
For method calls, I tried the same three access variations as for field access, with the added variable of using no-argument methods versus passing and returning a value on the method calls.
在方法调用中,我试用了与字段接入相同的三种接入变量,并增加了使用无参数方法变量,而不是在方法调用中传递和返回一个值。
The implementation contains methods encapsulating all required SQL statements for data access and manipulation.
该实现包含封装所有用于数据访问和操纵的sql语句的方法。
The membership interface defines callback methods to listen to events associated with access control such as adding or removing access to the component for one or more users.
成员关系接口定义了回调方法来监听与访问控制有关的事件,比如添加或删除一个或多个用户对组件的访问。
SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.
SCA还为单个服务集合的业务解决方案的组装提供了一个模型,并控制解决方案的各个方面,如访问方法和安全。
Before exploring the methods for doing this, let's first peer into the mind of the attacker and learn why they might want access to your network and systems.
在研究这样做的一些方法之前,让我们首先了解攻击者的想法并研究他们为什么想访问您的网络和系统。
This interface defines MSAA 1.3 properties and methods for the most common attributes and behaviors, and provides access to all UI controls.
该接口为通用的属性和行为定义MSAA 1.3属性和方法,并且提供对所有UI控件的访问。
It can be used to access fields and methods in instances of a class, giving a way of dynamically hooking together classes at runtime without the need for any source code links between the classes.
可用它来访问类实例中的字段和方法,从而提供了一种在运行时将类动态地挂钩在一起,却无需类之间有任何源代码链接的方法。
For example, data structures and access methods are specifically optimized to work on data that is located in main memory.
比如,数据结构和访问方法专门针对位于主内存中的数据进行了优化。
DBI defines methods, variables and conventions for database access.
DBI定义了访问数据库的方法、变量以及约定。
The last two return information for methods declared directly by the class, without regard to the access type of the method.
后两个变量返回类声明的方法的信息,与方法的接入类型无关。
For access to be granted to those methods, they must be explicitly marked as "remote" through the @WebRemote annotation.
若要将访问权赋予这些方法,它们必须通过 @Remote注释被显式地标记为 “remote”。
Since certain objects are being accessed via certain access methods and I/O operations, at least for the majority of all operations—the old rule is an 80-20 split.
由于某些对象是通过某些访问方法和I/O操作予以访问的,至少对大部分操作而言是这样 —原来的规则是 “二八开”。
The first and most important addition was access protection for methods and instance variables on classes -- the public, protected, and private keywords.
第一个也是最重要的新特性是针对类的方法和实例变量的访问保护 ——public、protected 和private 关键字。
So, deployment descriptor properties such as isolation levels, access intent, security, method permissions, and so on cannot be set for such problem methods.
所以,就无法为这类问题方法设置隔离级别(isolation level)、访问目的(access intent)、安全性(security)和方法许可(method permission)等这些部署描述符属性。
The two getACL...Map() methods give access to the inner data structures of the perspective for custom displays.
两个getACL...Map()方法提供了对自定义显示的内部数据结构的访问。
Each data object provides read and write access methods (getters and setters) for its properties.
每个数据对象都为属性提供了访问和设置方法(getter和setter)。
Access flags for read-only getter methods, to ensure that Entity EJB instances aren't marked as dirty and persisted into the database unnecessarily when they are read but not updated.
只读的读方法的访问标志,当读取但不更新实体e JB实例时,要确保它们未被标记为dirty并没有不必要地继续保存在数据库中。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
To enable memory access, it provides put and set methods for ints, chars, and bytes.
为允许内存访问,它为int、char和byte提供了put 和set方法。
There are three ways for client code to access MXBeans: through factory methods, through the platform server, or as proxies.
客户机代码访问MXBean有三种方式:通过工厂方法、通过平台服务器或作为代理。
From the provider's perspective, an analysis result can be loosely described as a container for domain-specific data, along with some basic access methods to manipulate it.
从Provider的角度看,一个分析结果基本上可以被描述成特定领域数据,以及管理这些数据一些基本访问方法的容器。
It includes a module specifically for working with the Google Base data API, providing pre-defined classes and methods to simplify data access and authentication.
它包含一个专门用于处理GoogleBaseDataAPI的模块,提供预定义的类和方法以简化数据访问和身份验证。
As was mentioned in the previous article, for single table access, there are two types of access methods: table space scan (TBSCAN) and index scan (IXSCAN).
在第1部分中提到过,有两种类型访问方法:表空间扫描(TBSCAN)和索引扫描(IXSCAN)。
It includes a module specifically for working with the Google Book Search data API, providing pre-defined classes and methods to simplify data access and authentication.
该库包含一个专门用于处理GoogleBookSearchDataAPI的模块,提供预定义的类和方法来简化数据访问和验证。
Next we'll define the security roles for security roles are named sets of users that will have access to secure resources (like a servlet, JSP, EJB or SCA component) and methods.
接下来,我们将定义安全角色。安全角色是具有安全资源(如servlet、JSP、EJB或SCA组件)及方法的访问权限的命名用户集。
An access plan defines the order for accessing tables, which indexes are used, and by what kind of join methods data is correlated.
访问计划定义按什么顺序访问表,使用哪些索引,以及用何种连接(join)方法来关联数据。
Make customer service convenient for the gamer to keep him from leaving the game in frustration — provide a variety of access methods, including chat, E-mail, and telephone.
提供方便的客户服务可以避免玩家由于失望而放弃游戏。这需要提供各种联系方法,包括网上聊天、电子邮件和电话。
It can be used to access fields and methods in instances of a class, providing a way of dynamically hooking together classes at runtime without the need for any source code links between the classes.
它能用于访问类实例中的字段和方法,从而提供了不需要类之间的任何源代码链接就能在运行时将类动态地挂钩在一起的方法。
Yet, the models and methods for doing data access are continually changing.
然而,实现数据访问的模型和方法一直在变。
应用推荐