Control of access to this water is essential.
水源控制权仍是基本。
Though, instead of outright control of access to the city, people are now talking about employing more locals.
但,与全面控制城市人口相反,人们正在讨论雇用当地人。
The degree of control of access and recording of use depends on the nature of the business and the records they generate.
存取控制与使用状况纪录的程度取决于营运的本质以及它们所产生的档案。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Two-thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want, so that they can control their own fertility.
这些文盲中有三分之二是女性,大约有2亿至2.5亿妇女无法获得她们想要的节育措施,这样她们就可以控制自己的生育能力。
Two thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want.
这些文盲中有三分之二是妇女,大约有2亿至2.5亿妇女无法获得她们想要的节育措施。
Videx of Corvallis brings intelligent access control.
位于科瓦利斯的威泰公司研发出了一种智能门禁。
With these options, the user can control the access of files and directories to copy to or from.
通过使用这些设置,用户可以控制对要复制的文件、源目录和目标目录的访问。
The key is to have some form of version control and access management to the architecture structure.
关键是要对体系结构的结构采用某种形式的版本控制和访问管理。
Objects can have several levels of access control.
对象可拥有几个级别的访问控制。
It is a form of mandatory access control.
它是强制访问控制的一种形式。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Provide functional and data entitlement by maintaining access control lists of users.
通过维护用户的访问控制列表来提供功能和数据权限。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
This undermines the value of the database's native access control and auditing function.
这会对数据库本机访问控制和审核功能的价值带来影响。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
They are responsible for the control of user access to the network.
他们的责任是控制用户对网络的访问。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
When a protected table is accessed, IDS enforces two levels of access control.
当用户访问一个受保护的表时,IDS实施两个级别的访问控制。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
This level of access control provides additional administrative control, especially useful for supporting multiple organizations.
这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
As a result, you can enforce the access control portion of user management.
因此,可以实施用户管理的访问控制部分。
Many variations of access control are possible, but in each case they are customized to the needs of the enterprise buyer.
访问控制可能存在许多差异,但每次都定制它们以控制企业买主的需求。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
Second, the server can take care of access control.
第二,服务器能够进行访问控制;
Second, the server can take care of access control.
第二,服务器能够进行访问控制;
应用推荐