• A better solution might be to control database object access through the use of schemas.

    更好解决方案可能通过使用模式控制数据库对象访问

    youdao

  • Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.

    用户身份丢失有些企业知道访问数据库所有用户的身份,以便进行访问控制

    youdao

  • It provides step-by-step details on the procedure for customizing your database, and includes some hooks on how to control access rights to certain fields.

    本文提供了定制数据库过程一步步细节内容并且包括一些如何某些字段控制访问权限钩子函数

    youdao

  • As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.

    正如前面提到的那样,EJB组件控制后台数据访问管理着当前事务数据库内部锁定

    youdao

  • Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.

    最终用户身份丢失为了进行访问控制企业需要了解实际访问数据库用户身份。

    youdao

  • Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.

    锁定数据库管理器用控制多个应用程序并发访问数据库数据机制

    youdao

  • Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.

    创建好所有必需数据库对象之后使用组成员关系和特权控制创建的数据库对象和包的访问

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.

    保持数据完整性的同时它们控制端数据的访问在内部当前事务数据库锁定进行管理

    youdao

  • The EJB components control the access to the back-end data and manage the current transactions and database locking internally.

    EJB组件控制后台数据访问管理着当前事务以及数据库内部锁定

    youdao

  • Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.

    访问控制细粒度的访问控制可能必须的,通过一个数据库查找特定于应用程序的授权服务调用实现。

    youdao

  • Specify the administrative DN, which not subject to access control or restrictions for operations on this database.

    指定管理DN用于访问控制限制数据库操作

    youdao

  • The control logic makes use of COM objects (3) to access the database.

    控制逻辑利用COM对象(3)访问数据库

    youdao

  • LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.

    LBACMandatoryAccess Control (MAC)一个实现存储在数据库中的敏感数据提供了较高级别的安全保障

    youdao

  • The enterprise beans control access to the back-end data and internally manage the current transactions and database locking.

    企业bean控制数据访问并且在内部管理当前事务数据库锁定。

    youdao

  • As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以对一个角色授予收回安全标签豁免权

    youdao

  • Label-based access control (LBAC), which provides new ways of controlling access to the sensitive data within the database.

    基于标签访问控制(LBAC),数据库中的敏感数据提供新的访问控制方法

    youdao

  • User roles and access control are inherent in Domino's database structure.

    用户角色访问控制都是Domino数据库结构与生具来的特性。

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

  • Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.

    更新数据库domforint . nsf访问控制列表(acl),防止匿名访问以及用户授权相应角色

    youdao

  • Singletons often control access to resources such as database connections or sockets.

    单例模式同样用于控制数据库连接或者sockets这样资源访问

    youdao

  • DB2 9.7 for LUW increases access control granularity, making it possible to give DBAs full control over a database without access to the actual data.

    DB 2 9.7for LUW改进了访问控制粒度DBA可以全面控制数据库而不必访问实际数据。

    youdao

  • More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.

    增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性它使可以在行级别上控制数据访问。

    youdao

  • Access Control Lists (ACLs) determining who can access each database and to what extent.

    访问控制列表(Access Control List,ACL)确定多大范围内访问每个数据库

    youdao

  • The use of an access database to store test execution information means there's no unit-level change control over individual test cases or test plans.

    一个保存测试执行信息访问数据库使用意味着对于个体的测试案例或者测试计划没有单元级别变更控制

    youdao

  • The database can enforce access control.

    数据库执行访问控制

    youdao

  • DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.

    DB 2数据库访问性能安全特性施加细粒度的控制—因此需要更细致的处理。

    youdao

  • For different users in the database, you can also control access to encrypted data.

    对于数据库内不同用户可以控制加密数据访问

    youdao

  • This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.

    这种加密方式可以控制应用系统用户数据访问权限并且真实数据所有数据库用户可见的,安全的一加密方式。

    youdao

  • The access plan can be collected with the db2expln command line tool or by right-clicking on your database in the DB2 Control Center and choosing the option Explain SQL.

    可以通过 db2expln命令工具或者DB2ControlCenter右键单击数据库选择 Explain SQL选项收集访问计划

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定