向mqm提供完全控制访问权,然后单击ok。
标签定义了关于WML平台控制访问信息。
The tag defines information about the access control of a WML deck.
如何将控制访问权限?
另一种控制访问的方法是基于角色的访问控制(RBAC)。
Another approach to controlling access is role-based access control (RBAC).
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
另外,这个脚本能根据需要控制访问权并过滤要交付的信息。
In addition, the script can control access and filter information for delivery, as required.
启用主机控制访问是wrappers的最关键之处,所以确定它未被注释。
Enable host control access is the whole point of wrappers, so make sure it is uncommented.
第二个层次更加细粒度,在数据级别来控制访问——往往通过URL。
Level 2 is more fine-grained, controlling access to the data level - typically the URL.
当保护信息免受非控制访问时,一个新的似然性可能得以应用,即无序。
When information should be protected against non - regulated access a new likelihood could be applied -chaos.
某些方案中会要求更为细致地控制访问,而不仅仅是授予、撤消或拒绝对数据的权限。
In some scenarios, there is a requirement to control access at a more granular level than that allowed by simply granting, revoking, or denying permissions on the data.
SQLJ提供了独特的使用静态SQL语句进行开发以及在DB2包级别控制访问的能力。
SQLJ provides the unique ability to develop using static SQL statements and control access at the DB2 package level.
审视运营规则:审核安全实践、补丁,以及到网络系统、应用、功能和数据的控制访问点。
Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.
所有的功能和命令都在眼前,这是一个相当简单的工作来管理控制访问权限的远程客户端。
All the functions and commands are at hand, it is quite a simple job to manage the remote clients that control the access permissions.
本文提供了定制数据库过程的一步步的细节内容,并且包括一些如何对某些字段控制访问权限的钩子函数。
It provides step-by-step details on the procedure for customizing your database, and includes some hooks on how to control access rights to certain fields.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
这些灵活性需要支持控制访问权限的转移,执行细粒度的访问控制和撤消之前许可的访问权限。
The policy flexibilities include controlling migrated access permissions, performing fine grain access control and revoking permitted access permission.
可以设置一些系统属性,来控制访问级别和虚拟机数据从JMX代理向管理客户机传递虚拟机数据的方式。
There are some system properties that you can set to control the level of access and the way in which VM data is transmitted from the JMX agent to the management client.
还需要理顺实践问题:数据应该怎样以及在何处长期存储,由谁控制访问权限以及谁将购买这些服务?
Practical issues need to be sorted out too: how and where should data be stored for the long term, who will control access, and who will pay for those services?
在最简单的情况下,当需要控制访问时,mashup应用程序的创建者可以确定允许使用mashup应用程序的用户或组。
For the simplest cases when access needs to be controlled, the creator of the mashup application can identify users or groups of users that are permitted to utilize the mashup applications.
审计功能现在根据指定的审计配置生成所有审计记录,可以控制访问DB2 的用户、访问时间和用户所在的位置等关键信息。
The audit facility now produces all audit records based on the audit configuration specified, controlling critical information about who is accessing DB2, when, and from where.
尽管之前探讨过系统没有用户的问题,但许多LAMP应用程序都利用这种功能性来控制访问、实现url重写,因此有必要理解其工作原理。
Despite the earlier discussion about not having users on the system, many LAMP applications use this functionality to control access and for URL rewriting, so it's wise to understand how it works.
记住authorization节点可以在子目录中的web .config文件中使用,也可以在元素中使用来控制访问单独的文件。
Remember that the authorization section can be used in web.config files placed in subdirectories, and can also be used in a element to control access to individual files.
您可以在DocumentManager中对电子表单进行编辑、创建版本和控制访问权限,就像可以对任何其他文本所做的一样。
You can edit, create versions, and control access of the e-forms in document Manager as you can with any other document.
它包含一个控制访问对象的安全核心,位于其上的是一些实现基本功能的模块,如加密和数字签名、证书管理、安全会话、数据密封等。
On top of the kernel are some modules which implement basic functions, such as encryption, digital signature, certificate management, secure session and data enveloping.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
因此,部署mashup应用程序后,mashup服务器可以通过集成的WebSphere ApplicationServerVMM功能轻松地控制访问。
Thus, when it is deployed, the mashup server is easily able to control access through the integration of the WebSphere Application Server VMM capability.
密码常被用来控制对计算机的访问。
Secret passwords are often used to control access to computers.
一位科学家曾经说过:“我已经得出结论,来自外太空的智能控制飞行器正在访问地球。”
A scientist once said: "I have concluded that the earth is being visited by intelligently controlled vehicles from outer space."
一位科学家曾经说过:“我已经得出结论,来自外太空的智能控制飞行器正在访问地球。”
A scientist once said: "I have concluded that the earth is being visited by intelligently controlled vehicles from outer space."
应用推荐