Every database management system must be able to protect data against unauthorized access and modification.
每个数据库管理系统都必须能保护数据不会受到未授权访问和修改。
All database access in the system is made through a DAO to achieve encapsulation.
系统中的所有数据库访问都通过DAO进行以实现封装。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
If the source database becomes unavailable (for example, if it crashes), the standby database on the target system can be activated for user access.
如果源数据库变得不可用(例如,它崩溃了),那么可以激活目标系统上的备用数据库,以供用户访问。
This helps lock down your system and ensures only users who are supposed to access the database actually do.
这可以保护系统,确保只有应该访问数据库的用户才能这么做。
Once an application is connected to the federated database, it can access all authorized objects in the federated system.
一旦应用程序连接到联合数据库,就能访问联合数据库中的所有已授权对象。
For making this both easier and more standardized, Embedded SQL is a metaprogramming system used to easily combine database access with C.
要让这个过程变得又简单、又标准化,那么嵌入式SQL就是一个很好的元编程系统,可以在C 语言中简单地合并数据库访问的功能。
Since Neo4j is a database, each access to the graph structure - read, write, and traversal - are managed by an ACID transaction system.
由于Neo4j是个数据库,因此对图形结构的访问——读、写及遍历都是通过ACID事务系统进行管理的。
This database role is defined with the minimum rights needed by a user to access Rational System Architect encyclopedias.
该数据库角色是用访问RationalSystem Architect百科全书用户所需要的最低权限来定义的。
You can store the data in the file system, an SQLite database, on the web, or any other persistent storage location your application can access.
你能将数据存储在文件系统、SQLite数据库、web或者任何你的应用能访问到的永久存储地点。
A login name for a Rational System Architect user needs a predefined set of server roles and database access rights.
RationalSystemArchitect用户所用的登录名需要一个预定义的服务器角色及数据库访问权限。
When session beans access the database directly, the overall performance of the system will improve.
当会话bean直接访问数据库时,会提高系统的整体性能。
Just in time for OSCON, the failure leaves all six million or more users of the open source database system unable to access source code, bug tracking, or discussion forums on the site.
此时正值oscon会议召开,故障导致该开源数据库系统的六百多万名用户无一能够访问源代码、跟踪bug和网站论坛。
Virtualized: Information Integrator provides a federated system to act as a virtual database which can transparently access any data, regardless of its location and SQL dialect.
虚拟化:Information Integrator提供了一个联邦系统来担当虚拟数据库,它能够透明地访问任何数据,不管自身的位置在哪里,也不管使用的是哪种SQL方言。
Finally for configuring the system, you must supply the userid information for the GridDataService to use access the DB2 database on your behalf.
最后,为了配置系统,必须提供GridDataService的用户id信息来存取db2数据库。
It's a distributed memory caching system which Facebook (and a ton of other sites) use as a caching layer between the web servers and MySQL servers (since database access is relatively slow).
它是一个分布式的内存缓存系统,Facebook(包含其他很多网站)用它作为Web服务器和MySQL服务器之间的缓存层(因为数据库访问相对比较慢)。
To grant your administrative account access through Exchange System Manager to all the mailboxes that are in a single database (regardless of inherited explicit denials), follow these steps.
若要通过“Exchange系统管理器”向您的管理帐户授予对单个数据库中所有邮箱的访问权限而不管继承的显式拒绝,请执行以下操作:1 .启动“Exchange系统管理器”,然后找到要对其中存储的邮箱具有完全访问权限的数据库。
Physical class and attribute structure of system interfaces (which will equate to database structures where direct data access is the best or only option).
系统接口的物理类及属性结构(等同于数据库结构,在其中直接数据访问是最好或唯一的选择)。
Configuring file system access along with user input is dangerous, so it's best to avoid it altogether by designing your application to use a database and hidden, generated file names.
同时配置用户输入和文件系统访问权十分危险,因此最好把应用程序设计为使用数据库和隐藏生成的文件名来避免同时配置。
Please note that you can connect and have full access to the tables in the DB2 database as any of the system users from within your application.
请注意,可以作为任何系统用户从应用程序连接DB2数据库,对其中的表有完全访问权。
This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.
这种加密方式可以控制应用系统的用户对数据的访问权限,并且真实数据对所有数据库用户都是不可见的,是最安全的一种加密方式。
If it's a Web application, you need access to the database, along with a Web server, container, and any associated configuration aspects to run a system test.
如果是一个Web应用程序,您就需要访问数据库以及Web服务器、容器和任何与运行系统测试相关的配置。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
So, in the order to run a Perl script that has access to your DB2 database, you need the following components on your system.
因此,为了运行访问DB2数据库的perl脚本,需要在系统上安装以下组件。
Connectivity (network access) information is stored in the system database directory, local database directory and node directory.
连接(网络访问)信息存储在System数据库目录、本地数据库目录和节点目录中。
Local access to the JDBC driver library files (and dependent license files) based on your hub database system.
基于hub数据库系统对JDBC驱动程序库文件(及相关许可文件)的本地访问权限。
This thesis introduces the major characteristic of ASP technology and ASP access database technology, and the application of the technology in consulting system online.
介绍了ASP技术的主要特点和ASP访问数据库技术,以及该技术在网上咨询系统中的应用。
If you do not have access to a version control system, can you still use Optim Database Administrator?
如果没有版本控制系统,是否仍然可以使用OptimDatabaseAdministrator ?
If you do not have access to a version control system, can you still use Optim Database Administrator?
如果没有版本控制系统,是否仍然可以使用OptimDatabaseAdministrator ?
应用推荐