All APM systems access performance data sources and include facilities for collecting and tracing.
所有APM系统都能访问性能数据源并提供数据收集和跟踪实用工具。
Implementation of Enterprise Information Systems access in Service-Oriented Architecture: a bottom-up approach.
实现对面向服务的体系结构中企业信息系统的访问:自底向上方法。
The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.
业务需求是,在完全不同的系统之上提供内部的应用程序来访问遗留系统中的企业数据库。
The codes—which typically range in price from $80 to $155 per course—give students online access to systems developed by education companies like McGraw Hill and Pearson.
这些访问码的价格通常在每门课程80美元到155美元之间不等,学生需要通过这些访问码才能在线使用麦格劳·希尔和培生等教育公司开发的系统。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them.
很多情况下,破坏是由简单的失误造成的,比如未能将包含敏感数据的系统与不需要访问这些数据的系统分离开来。
Now you can access the cloned file systems.
现在可以访问克隆的文件系统。
The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.
用户必须在为用户出口路径配置的目录上使用主机系统文件访问控制,以确保库不容易受到攻击。
This includes functions such as loading and removing classification systems, and setting up access control policies.
这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
Access to other operating systems.
访问其他操作系统。
Similar inequalities exist in the coverage of immunization systems and access to good schools, in access to credit and even in coverage of the law.
在免疫系统覆盖率方面,在进入好的学校、获得贷款方面,甚至在法律的覆盖率方面,都存在着类似的不平等现象”。
Answer: With a J2EE application, all users of the application use the same login to access backend systems.
答:对于J2EE应用程序,所有用户都使用同样的登录信息来访问后端系统。
The lack of proper systems to access and manage their information assets can cripple an organization.
缺乏适当的用来访问和管理企业信息资产的系统可能会给企业带来损害。
Most of the current systems implement access control and authorization in a proprietary manner.
目前多数系统都以专有的方式实现访问控制和授权。
That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.
也就是说,通过欺骗在您的组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
In proprietary access control systems, information about these entities and their attributes is kept in repositories.
在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。
Continuing with the processes theme, operating systems virtualize access to the underlying resources of the machine to processes.
继续讨论进程,操作系统将对机器的底层资源的访问虚拟化为进程。
Typically, this is the IP through which systems administrators access a node.
通常,系统管理员通过这个IP访问该节点。
Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.
大多数操作系统使用访问控制来判断一个实体(用户或程序)是否能够访问给定资源。
They also had detailed knowledge of Siemens’s industrial-production processes and control systems, and access to the target plant’s blueprints.
他们还掌握了西门子工业生产流程和控制系统的详细资料,并可以看到目标工厂的设计图。
It has provided access to POSIX-like systems.
它提供对类POSIX系统的访问。
As well, you get access to operating systems and various middleware and software products.
同样,您可以访问操作系统和各种中间件和软件产品。
A password policy is put in place to ensure the systems that users access are secure.
密码策略用来确保用户访问的系统的安全性。
A customer had several lines of businesses that required access to legacy systems.
一个客户有多条需要访问遗留系统的业务线。
Now you need to create an account on AIX for the Systems Director database access and schema.
现在您需要在AIX上创建一个帐户,用于SystemsDirector数据库访问和架构。
They are often crucial parts of high volume transactional systems and have access to sensitive data.
它们往往是事务性系统的关键部分。
They are often crucial parts of high volume transactional systems and have access to sensitive data.
它们往往是事务性系统的关键部分。
应用推荐