• The distinctive address that identifies a NIC is called the Media Access Control (MAC) address.

    这个识别网卡的独特地址就是所谓媒体访问控制(MAC)地址。

    youdao

  • The startup's product enables older adults who may not be comfortable with computers to access email, video chat and social media using just their televisions and a remote control.

    这家初创公司的产品可以让可能习惯使用电脑老年人只用电视机遥控器收发电子邮件视频聊天使用社交媒体

    youdao

  • It is a form of mandatory access control.

    强制访问控制一种形式

    youdao

  • As you can see, the mechanism provided here can implement a very fine-grained type of access control.

    正如看到那样,这里所提供机理可以实施一种非常精细访问控制

    youdao

  • It is a container for documents for which access control can be defined.

    一个文档容器,您可以其中的文档定义访问控制

    youdao

  • As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.

    作为一项最佳实践隐藏中的部分行的时候,应该使用视图控制访问

    youdao

  • Create a portable and standard way of describing access control entities and their attributes.

    创建一种可移植标准方式来描述访问控制实体及其属性

    youdao

  • Each of these application roles aggregates a set of very specific portal access control roles.

    其中的每个应用程序角色聚合非常特定门户访问控制角色。

    youdao

  • Singletons are a useful way to control access to a class, making sure that only one instance can exist.

    单例模式有用的控制访问途径他能保证只有个类实例存在。

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

  • XACML is an initiative to develop a standard for access control and authorization systems.

    XACML的初衷开发一项访问控制授权系统标准

    youdao

  • As a best practice, consider using stored procedures as a way to control access to your data.

    作为一项最佳实践应考虑使用存储过程控制数据访问

    youdao

  • In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.

    当前以网络为中心业务模型中,验证个人身份控制访问维护数据完整性保密性变得越来越

    youdao

  • This requires RACF to use several different profiles in various classes to control access to a resource.

    要求RACF不同使用几个不同概要文件控制资源访问

    youdao

  • What happens when the everyday user tries to access a control that is authorized only for administrators?

    用户每天都访问授权管理员的控制权时,会发生什么

    youdao

  • For example, POP3's single mailbox model can lead to thousands of large messages in a single location, making access and control of the mailbox a tedious affair.

    例如POP3单一邮箱模型导致数千大型消息都处于一个位置从而使得邮箱的访问控制成了件麻烦事

    youdao

  • A typical access control and authorization scenario includes three main entitiesa subject, a resource, and an action — and their attributes.

    典型访问控制授权场景包括三个主要实体主体资源和动作以及它们的属性

    youdao

  • Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.

    主题访问控制通常发布引擎基于主题层次结构中的访问控制列表进行管理

    youdao

  • If access to projects is a concern, then you can create security policies that control access to certain groups.

    如果项目访问您所关注的,那么应该创建安全策略控制一定能够访问项目。

    youdao

  • While this is not the place for a thorough discussion on access control, you will need some idea about how users and groups are applied to files.

    虽然在这里我们不能详尽地论述访问控制,不过应该用户文件的访问权限初步的了解。

    youdao

  • As a best practice, consider using LBAC as a way to control access to sensitive data.

    作为最佳实践应考虑使用LBAC作为控制敏感数据访问的一种方法

    youdao

  • Role determines the access control for a user.

    角色决定用户访问控制

    youdao

  • As a result, you can enforce the access control portion of user management.

    因此可以实施用户管理访问控制部分

    youdao

  • It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.

    确保脚本可以安全执行提供一个沙箱控制DOM访问修改

    youdao

  • Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.

    测试访问帮助查明未授权用户是否能够成功访问只有管理员有权使用控件

    youdao

  • Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?

    访问一个未经授权用户能成功访问只有经过授权管理员才能使用的控制权吗?

    youdao

  • A security and access control model that distinguishes between these two classes of users.

    区分上述用户安全和访问控制模型

    youdao

  • A myriad of tools are required to provide the proper IT governance and access control at a macro level.

    提供适当IT治理全面的访问控制需要使用许多工具

    youdao

  • A common way to control access to table data is using views.

    控制数据访问一种常见方法使用视图

    youdao

  • You can divide configuring a simple access control policy into two steps.

    配置简单访问控制策略分为两个步骤

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定