The distinctive address that identifies a NIC is called the Media Access Control (MAC) address.
这个识别网卡的独特地址就是所谓的媒体访问控制(MAC)地址。
The startup's product enables older adults who may not be comfortable with computers to access email, video chat and social media using just their televisions and a remote control.
这家初创公司的产品可以让可能不习惯使用电脑的老年人只用电视机和遥控器就能收发电子邮件、视频聊天和使用社交媒体。
It is a form of mandatory access control.
它是强制访问控制的一种形式。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
It is a container for documents for which access control can be defined.
它是一个文档容器,您可以为其中的文档定义访问控制。
As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.
作为一项最佳实践,在您想隐藏表中的部分列或行的时候,应该使用视图来控制对表的访问。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
Each of these application roles aggregates a set of very specific portal access control roles.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
Singletons are a useful way to control access to a class, making sure that only one instance can exist.
单例模式是一种有用的控制类访问的途径,他能保证只有一个类实例存在。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML的初衷是开发一项访问控制和授权系统的标准。
As a best practice, consider using stored procedures as a way to control access to your data.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
This requires RACF to use several different profiles in various classes to control access to a resource.
这要求RACF在不同的类中使用几个不同的概要文件来控制对资源的访问。
What happens when the everyday user tries to access a control that is authorized only for administrators?
当用户每天都试着访问仅授权给管理员的控制权时,会发生什么?
For example, POP3's single mailbox model can lead to thousands of large messages in a single location, making access and control of the mailbox a tedious affair.
例如,POP3的单一邮箱模型会导致数千条大型消息都处于一个位置,从而使得对邮箱的访问和控制成了件麻烦事。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.
对主题访问的控制将通常由发布引擎基于主题层次结构中的访问控制列表进行管理。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
While this is not the place for a thorough discussion on access control, you will need some idea about how users and groups are applied to files.
虽然在这里我们不能详尽地论述访问控制,不过您应该对用户和组对文件的访问权限有初步的了解。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
Role determines the access control for a user.
角色决定用户的访问控制。
As a result, you can enforce the access control portion of user management.
因此,可以实施用户管理的访问控制部分。
It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.
它还确保脚本可以安全执行,并提供一个沙箱来控制DOM的访问和修改。
Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
A security and access control model that distinguishes between these two classes of users.
区分上述两类用户的安全和访问控制模型。
A myriad of tools are required to provide the proper IT governance and access control at a macro level.
提供适当的IT治理和全面的访问控制需要使用许多工具。
A common way to control access to table data is using views.
控制表数据访问的一种常见方法是使用视图。
You can divide configuring a simple access control policy into two steps.
配置简单的访问控制策略可分为两个步骤。
应用推荐