Access of CONTROL or ALTER, on the other hand, means that there is no MQI security for that connection.
另一方面,CONTROL或ALTER访问意味着那个连接没有MQI安全性。
Two-thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want, so that they can control their own fertility.
这些文盲中有三分之二是女性,大约有2亿至2.5亿妇女无法获得她们想要的节育措施,这样她们就可以控制自己的生育能力。
Two thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want.
这些文盲中有三分之二是妇女,大约有2亿至2.5亿妇女无法获得她们想要的节育措施。
Videx of Corvallis brings intelligent access control.
位于科瓦利斯的威泰公司研发出了一种智能门禁。
With these options, the user can control the access of files and directories to copy to or from.
通过使用这些设置,用户可以控制对要复制的文件、源目录和目标目录的访问。
Objects can have several levels of access control.
对象可拥有几个级别的访问控制。
It is a form of mandatory access control.
它是强制访问控制的一种形式。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
Provide functional and data entitlement by maintaining access control lists of users.
通过维护用户的访问控制列表来提供功能和数据权限。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
This undermines the value of the database's native access control and auditing function.
这会对数据库本机访问控制和审核功能的价值带来影响。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
They are responsible for the control of user access to the network.
他们的责任是控制用户对网络的访问。
When a protected table is accessed, IDS enforces two levels of access control.
当用户访问一个受保护的表时,IDS实施两个级别的访问控制。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
This level of access control provides additional administrative control, especially useful for supporting multiple organizations.
这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
As a result, you can enforce the access control portion of user management.
因此,可以实施用户管理的访问控制部分。
Many variations of access control are possible, but in each case they are customized to the needs of the enterprise buyer.
访问控制可能存在许多差异,但每次都定制它们以控制企业买主的需求。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
The project is narrowly scoped to solve the problem of access control to avoid imposing a large and complex change patch on the mainstream kernel.
这个项目专门用于解决访问控制问题,以避免对主流内核进行大量的复杂修改。
Second, the server can take care of access control.
第二,服务器能够进行访问控制;
The repository can categorize and provide access control for any of your submitted assets.
储存库可以分类并对提交资源提供了访问控制。
This type of control is called mandatory access control (MAC).
这种控制类型称为强制访问控制(MAC)。
To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.
为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。
This approach obviously offers more precise control than the simple password-based authentication shown earlier, and is recommended for applications that require multiple levels of access control.
这种方法显然比前面显示的基于密码的方法提供更加精确的访问,并且推荐需要多级访问控制的应用程序使用该方法。
应用推荐