However, there are still some situations where choosing static SQL makes sense, involving security considerations, and maximizing performance for certain OLTP workloads.
然而,仍然有一些适合静态SQL的情形,比如涉及到安全性因素、针对某些OLTP工作负载最大化性能等情况。
Security considerations for the two service applications.
对于两个服务应用程序的安全考虑。
For more information on security considerations when using.vsdisco files, see Resources.
有关使用.vsdisco文件时的安全注意事项,请参见参考资料。
To understand the Expect source, it's easiest for the moment to neglect security considerations.
要了解expect源代码,目前更简便的做法是忽略安全性考虑事项。
The article concludes with security considerations for the agent and job manager topologies.
本文最后讨论代理拓扑和作业管理器拓扑的安全注意事项。
The importance of securing context for the SYSTEM.COMMAND.INPUT queue and its alias was described above under Special considerations for CONTEXT security for the command queue.
保护 SYSTEM.COMMAND.INPUT队列及其别名的上下文的重要性已在上面的 关于命令队列的CONTEXT安全性的特殊考虑 一节中介绍。
Special considerations for CONTEXT security for the command queue
关于命令队列的CONTEXT安全性的特殊考虑
You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.
为此,可以限制对可能会影响它们的命令的访问,或者,也可以通过命令资源安全性提供保护。
In this context, for our energy security considerations, the building of new energy base has great significance.
在这种背景下,基于我国能源安全的考虑,建设新的能源基地意义重大。
However, the borders own defects, lack of national strategic considerations and inherent barriers to security, are still the main constraints for the border to play a fulcrum role.
但是,边境的自身缺陷、国家战略的考量缺失和安全的固有障碍仍是边境发挥支点性作用的主要制约。
For more information about security boundaries as they apply to assemblies, see Assembly security Considerations.
有关应用于程序集的安全边界的更多信息,请参见程序集安全注意事项。
For more information about security boundaries as they apply to assemblies, see Assembly security Considerations.
有关应用于程序集的安全边界的更多信息,请参见程序集安全注意事项。
应用推荐