• The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.

    TCS要求控制关键系统资源分配释放包括数据库记录通信套接字安全密钥等等

    youdao

  • This article explains what the plug-in writer or database administrator should test before deploying the customized security plug-ins to the DB2 system.

    本文阐述了将定制安全性插件部署DB 2系统插件编写人员数据库管理人员应该测试的内容。

    youdao

  • System management: data management, data warehouse security, system and database backup and recovery, and so on.

    系统管理数据管理、数据仓库安全性、系统数据库备份恢复等等

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • Note that a database administrator or system administrator does not possess the database security administrator authority by default.

    注意默认情况下数据库管理员系统管理员并不拥有数据库安全管理员权限

    youdao

  • Along with this database, the te implements security policies that add another level to system security.

    除了这个数据库以外,TE实现安全策略,从而增添另一个级别系统安全性

    youdao

  • The database security administrator configures the LBAC system by creating security policies.

    数据库安全管理员通过创建安全策略来配置LBAC系统

    youdao

  • It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.

    可以一些数据库事件例如授权检查、数据库对象维护安全性维护、系统管理用户验证等做日志记录。

    youdao

  • Security considerations when connecting to a database from a client system to a server system.

    客户机系统通过服务器系统连接数据库安全性考虑

    youdao

  • Computer system and network security are basis of security of distributed database system.

    计算机系统网络安全分布式数据库系统安全基础

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • Prior to 2003, the domestic database encryption means through the compilation of foreign security database system.

    在2003年之前国内数据库加密手段是通过编译国外安全数据库系统完成

    youdao

  • An SMS security system development scenarios, including case development source code and database files.

    说明:一个短信防伪系统开发案例包括案例开发程序数据库文件

    youdao

  • In this paper we deal with some security techniques applied to network elective system and the construction of an elective database.

    介绍种可行网上选课系统的规划、流程以及所采取安全技术

    youdao

  • Interface design influences the security of whole system in database application development.

    数据库应用开发接口设计影响整个系统安全性

    youdao

  • Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.

    然后系统三个难点问题——异常处理安全权限控制异构数据库访问进行了深入的研究。

    youdao

  • Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.

    数据完整性合法存取受到很多方面安全威胁包括密码策略系统后门数据库操作以及本身安全方案

    youdao

  • As the data and information primary storage mode, the security of the database is an important part of accounting information system.

    会计信息系统数据库作为数据信息主要存储方式安全控制问题系统构建的关键

    youdao

  • System security is one of the chief problems in large-scale database design.

    系统安全大型数据库系统设计中的一个重要问题

    youdao

  • Author take part in this project, and undertook to analyzed the system requirements, the system functions design, database design, the security of the internal network and so on.

    论文作者参加该项工作,承担系统需求分析功能设计数据库设计、安全设计、网站开发后期系统测试工作。

    youdao

  • Among the others, high availability of hospital's network system and high security nature of database are mostly concerned about.

    医院网络系统可用性数据库的高安全性其中最为引人关注的问题。

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • The MIS design is detailed in distributed database design, distributed function design and system security design.

    MIS系统的数据库功能系统安全分布式设计三个方面分别加以阐述

    youdao

  • The integrated model can simplify administration of privileges, and is appropriate for multilevel relation database system which has many users or complex security levels.

    模型方便了管理员权限管理,适合用户较多,安全层次比较复杂多级关系数据库系统

    youdao

  • It is impossible to modify the business database products, according to the realization, database security proxy is put forward to enhance the security of database application system.

    由于可能商用数据库产品进行修改应用实际出发,提出由数据库安全代理增强数据库应用系统安全性

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • This paper introduces the basis of implementation, database design, security design, interface design etc for the booking system of physical experiments on the network.

    介绍物理实验网上预约系统实现基础数据库设计安全性设计、界面设计

    youdao

  • Starting from MIS system design for chain eatery in this paper, the logic structure design, functional design, database design and security administration of the system is presented in detail.

    餐饮连锁企业MIS系统设计出发,对系统的逻辑结构设计、功能设计、数据库设计系统的安全管理进行了详细的描述和深入的探讨。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定