• Any authorization code can be injected here.

    任何授权代码可以在此注入

    youdao

  • Note that the developer need write no authorization code.

    注意部署人员无需编写任何授权代码。

    youdao

  • Authorization code which includes two groups: group 1 is the month to 5-bit binary code, date of group 2 is 5-bit binary code.

    其中授权包含第1当月的5位二进制码、第2组是当日5位二进制码。

    youdao

  • Authorization checking performed in this way will be somewhat slower than inline code, particularly when invoked through a separate process.

    这种方式执行授权检查内联代码一点,尤其是通过单独进程来调用时候

    youdao

  • Authorization is invoked frequently and across a wide footprint of code.

    频繁地调用授权并且可以跨大量代码进行调用。

    youdao

  • The first is a time-based authorization mechanism and the second is the ability to be further expanded by other macros and code.

    第一个特性基于时间的授权机制第二个特性是能够其他代码进行进一步扩展

    youdao

  • But lots of programmers could know the application's DB2 authorization ID and password-because, as mentioned, these are embedded in program code.

    但是许多程序员可能知道应用程序DB 2授权ID密码因为前面已经提到这些信息嵌入程序代码中。

    youdao

  • A developer can authorize or deny arbitrary functionality as needed, but the application's authorization policy is now partially or completely embedded in its code.

    开发人员可以根据需要授权拒绝任意功能但是应用程序授权策略现在部分全部嵌入代码中。

    youdao

  • Instead of giving your ATM card and PIN code, the card can double as a credit card with a signature authorization.

    不用交出ATMPIN密码,只需获得信用卡签名的授权,你就可以使用信用卡。

    youdao

  • Legacy portals had been deployed with custom authorization and authentication methods, each with custom code that needed to be updated and maintained.

    遗留门户已经使用定义授权身份验证方法部署每个门户都需要更新和维护的自定义代码

    youdao

  • In fact, custom code written for authentication or authorization is generally pretty easy to find or hack holes in.

    事实上,在为进行身份验证授权而编写自定义代码通常容易找到漏洞或对漏洞进行攻击。

    youdao

  • Understanding and maintaining the authorization policy will be an order of magnitude more difficult, even if the code is free from defects.

    了解维护授权策略更加困难即使代码没有任何缺陷。

    youdao

  • Apparently that violates Title 18, Part 1, Chapter 47 of the United States Code, which covers anybody who "intentionally accesses a computer without authorization or exceeds authorized access."

    显然违反了联邦法令第47章第一第18款,条款规定:“任何人不得在未授权的情形下蓄意接入越权接入他人电脑。”

    youdao

  • Tivoli provides a solution that relieves the business code from having to implement that kind of authorization extension.

    Tivoli提供了一种解决方案使得业务代码不必实现授权扩展

    youdao

  • It's certainly possible to factor code to adapt to this lack of fine control, but eventually the rigidity of declarative authorization will begin to warp and complicate the application's structure.

    当然可以代码适应这种缺少精细控制的情况,但是声明式授权刻板最终扭曲复杂化应用程序结构。

    youdao

  • It's certainly possible to factor code to adapt to this lack of fine control, but eventually the rigidity of declarative authorization will begin to warp and complicate the application's structure.

    当然可以代码适应这种缺少精细控制的情况,但是声明式授权刻板最终扭曲复杂化应用程序结构。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定