• Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • Develop policies and procedures that tell you what to do before, during and after a breach of data security.

    制定公司政策过程,以告诉平时应该什么,发现数据安全问题应该做什么。

    youdao

  • Policies can also force strong passwords and set security features such as the number of times a password attempt can fail before the device wipes its data.

    这方面的政策可以要求设定复杂的密码以及设置安全功能多次密码输入错误后自动设备的数据。

    youdao

  • Work is now going on in the SAE to automate the end-user feedback collection and support a level of community moderation compliant with enterprise data governance and security policies.

    SAE中的相关工作现在正在进行,自动化形式收集最终用户反馈支持某种遵从企业数据治理和安全策略的修改级别

    youdao

  • As part of assigning a risk level, you have to consider the security policies assigned to the data.

    作为分配风险等级一部分,必须考虑分配给数据安全性策略

    youdao

  • The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.

    这些策略安全服务器集中管理并且发送根据需要保护数据代理

    youdao

  • ALL security policies defined with RFIDIC have ALLOW semantics, meaning, the policies define what data can be disclosed.

    RFIDIC定义所有安全策略都具有allow语义这意味着策略定义哪些数据可以公开的。

    youdao

  • These security policies are defined using the master data in the system. The policies require no customer development.

    使用系统中的数据定义这些安全策略客户需要开发它们。

    youdao

  • In order to show the effects of data disclosure control by defining and enabling security policies, you need to send a few sample events to RFIDIC by using its capture interface for message queues.

    为了显示定义启用安全策略所产生数据公开控制效果需要使用RFIDIC的捕捉接口RFIDIC发送一些示例事件

    youdao

  • Like Facebook today, it was criticized for its policies on privacy, security and willingness to sell user data, as well as its use of its own proprietary tools.

    就像今天Facebook,美国在线在隐私政策安全出售用户数据使用自有专门工具等方面备受指责。

    youdao

  • Administrator: Users in this role can run any query in the Data Browser, create security policies, and browse and resubmit failed events.

    Administrator:属于这个角色用户可以DataBrowser中运行任何查询创建安全策略以及浏览重新提交失败事件

    youdao

  • Security: This is the entry point for applications to access heterogeneous data sources based on who-can-see-what policies.

    安全性Security):应用程序访问基于 who-can-see-what 策略的不同种类数据源入口

    youdao

  • Security professionals need to be able to apply security policies to applications, data, and users wherever they are, and those policies need to adapt based on the changing context.

    无论应用数据用户身处何方,安全专业人士必须能够充分利用安全政策这些政策必须根据不断变化的环境适应新的条件

    youdao

  • Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.

    人员用户帐号系统策略数据保护病毒防治制定了详细安全措施

    youdao

  • Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.

    描述信息技术保全政策程序密码保护识别滥用不当访问篡改改变业务数据程序。

    youdao

  • WCF Data Servicess do not implement security policies but instead provide the infrastructure required for service developers to write their own security rules and business validation.

    WCF数据服务实现安全策略而是提供必需基础结构,以便服务开发人员编写自己的安全规则和业务验证。

    youdao

  • These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.

    进一步地介绍数据库验证外部验证、企业验证并发许可用户验证和许可限制。

    youdao

  • These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.

    进一步地介绍数据库验证外部验证、企业验证并发许可用户验证和许可限制。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定