In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。
But the access and control software of the USB equipment were only used in application level, and the consumer can't do the second development.
但是目前已有的usb设备所配备的访问与控制软件和设备驱动都是应用级的,用户无法做二次开发使用。
This article describes the device server software used to provide device access service in distributed control system.
讲述了分布式控制系统中用于提供设备访问服务的设备服务器软件的实现方法。
A file-management system is a set of system software that provides services to users and applications in the use of files, including file access, directory maintenance, and access control.
一个文件管理系统是提供对用户服务和文件使用方面的一组系统软件,包括文件的访问,目录维护和存取控制。
UI design is one important aspect in the development of the application software systems, and access control (security management) plays a comparably important role in modern software systems.
用户界面设计是应用软件系统开发的一个重要方面,而权限访问控制(或安全管理)在现代软件系统中同样有着重要的地位。
The access control equipment and the remote control software in this system achieve SIP user agent function, and thereby providing the ability to access SIP system.
系统中接入控制设备和远程控制软件实现SIP用户代理功能,从而提供接入SIP系统的能力。
This paper presents a framework and policy mechanism of query access control of software component in peer-to-peer network.
阐述对等网络环境下的构件查询访问控制框架及其策略与机制。
Such technology would permit a company, for example, to freshen up workers' computers from afar and to control remotely which software certain workers can access.
例如,使用这样的科技将能允许一家公司从远处整理更新员工的电脑,并且远程控制特定员工所能通过的特定程序。
With 35 categories, our parental control software gives you the ability to fine tune access to websites and ensure that harmful content is blocked.
有35类,我们的家长控制软件使您能够微调访问的网站,并确保被阻止有害内容。
Usually a hacker using different server hardware and software vulnerabilities to get access to the server and control over sensitive information.
通常黑客利用各种服务器软硬件漏洞,获得服务器的控制权与敏感信息。
With the addition of standard software components, the new controller eliminates the need for separate, dedicated access control, CCTV, intrusion, and intercom systems.
除了标准的软件组件,新的控制器无需加入单独的出入口控制系统、闭路电视、入侵、和对讲系统等。
With the addition of standard software components, the new controller eliminates the need for separate, dedicated access control, CCTV, intrusion, and intercom systems.
除了标准的软件组件,新的控制器无需加入单独的出入口控制系统、闭路电视、入侵、和对讲系统等。
应用推荐