• The name of the protected data section.

    受保护数据名称

    youdao

  • They are granted to users to allow them access to protected data.

    可以将安全标签用户允许他们访问保护的数据。

    youdao

  • Protected data can be recovered later if you know the remote control code.

    受保护数据可以恢复如果知道远程控制代码

    youdao

  • And protected data can be recovered later if you know the remote control code.

    受保护数据可以恢复如果知道远程控制代码

    youdao

  • For our simple purposes, a recoverable action is anything that modifies protected data.

    简单地,可恢复动作修改被保护数据的任何事情。

    youdao

  • The security administrator allows users access to protected data by granting them security labels.

    安全管理员通过用户授予安全标签允许用户访问受保护数据

    youdao

  • The database security administrator allows users access to protected data by granting them security labels.

    数据库安全管理员通过用户授予安全标签来允许他们访问受保护数据

    youdao

  • Direct ownership is a very common form of instance-based relationship between a user and some protected data.

    直接所有权用户某些受保护数据一种十分常见基于实例的关系。

    youdao

  • An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.

    豁免权使用户可以访问安全标签允许访问受保护数据

    youdao

  • When a user tries to access protected data, his security label is compared to the security label that is protecting the data.

    一个用户试图访问保护的数据时,必须将安全标签保护数据的安全标签进行比较。

    youdao

  • When a user tries to access protected data, that user's security label is compared to the security label protecting the data.

    一个用户试图访问保护的数据时,用户安全标签将与用于保护数据安全标签相比较

    youdao

  • An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.

    豁免权使原本安全标签权限不足用户可以访问受保护数据

    youdao

  • To access protected data in a change management system such as Rational Team Concert, you typically must furnish a user name and password.

    为了访问RationalTeamConcert之类变更管理系统保护的数据,通过重复使用已存在的标准必须能够完善用户名字密码

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • These instructions can make quick work of the task of making sure protected data can only be accessed by authorized entities on your Linux system.

    这些指示可以快速确保受保护数据只能Linux系统已授权实体访问

    youdao

  • The shortcoming in focusing on such sturdy digital walls is that once they are evaded, the attacker has access to all the protected data behind them.

    关注加固数字缺点一旦他们绕过攻击者就获得所有保护的数据。

    youdao

  • Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.

    安全标签应用保护数据数据库对象,将安全标签用户他们可以访问保护的数据。

    youdao

  • When a mashup application integrates protected data sources or services acquired from another vendor, credentials are required to access these systems.

    mashup应用程序集成受保护数据源其他供应商获得服务时,若访问这些系统提供凭证

    youdao

  • In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.

    本文中,谈到数据安全性机密性方面确保受保护数据只能授权用户系统访问

    youdao

  • Many tasks break down into two distinct types of work, however: tasks that only need to read the protected data structures and those that must make changes.

    因此,就必然会产生两种截然不同任务保护数据结构读取任务更改结构体的任务。

    youdao

  • The three key technologies of tobacco toasting autocontrol system are to be realized stably temperature collecting, to be protected data after turn-off, and real time clock function.

    烟叶烘烤自动控制系统三大核心技术实现稳定温度采集、掉电保护实时时钟功能

    youdao

  • However, the way you solve the problem differs when you are thinking functionally. Consider the example in Listing 3 (taken from a larger codebase) of a method that does protected data access.

    然而如果函数式思维问题解决方法有所不同

    youdao

  • These keysets provide read and write access to the data protected by their keys.

    这些通过它们的提供保护数据读写权限

    youdao

  • The data protected by these locks is needed constantly by many threads, and you can expect that when you go to acquire this lock, you may have to wait until someone else is done with it.

    不断地会有许多线程需要这些保护数据所以可以想象取得这个的时候,可能不得不等候其他人它。

    youdao

  • In future, cloud providers will offer many more options for where data are kept and how they are protected.

    未来服务的提供上门提供更多数据存储地点保护方式选择

    youdao

  • Traditionally, data has skulked about, protected and doled out carefully by its handlers, or has hidden from view, wearing dark sunglasses, mingling among the commoners of the Web.

    在传统上数据管理者小心隐藏保护公开,或者隐藏在公众视线以外,披上了层层伪装,或者淹没在网络海洋之中

    youdao

  • It is important that this data is correctly protected from the competing requirements of those transactions that require read access, and those that require update access.

    请求访问请求更新访问事务之间产生冲突时,数据能否得到正确保护十分重要的。

    youdao

  • Locking should ensure both that per-CPU data structures and state are always protected against preemption.

    锁定可以确保每个CPU数据结构状态始终受到保护而不被抢占

    youdao

  • That data must be captured accurately, governed, protected, and held confidential.

    数据必须予以精确捕获、治理保护以及进行保密。

    youdao

  • That data must be captured accurately, governed, protected, and held confidential.

    数据必须予以精确捕获、治理保护以及进行保密。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定