• If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.

    如果谨慎地控制文件系统访问权限,用户只需手工编辑配置文件,就可以破坏产品安全性控制(比如审计)。

    youdao

  • This security framework example will control the functions presented to the user.

    安全性框架示例控制呈现用户功能

    youdao

  • For example, for a queue, an MQQUEUE profile is used to control MQI access to the queue, but other profiles in the MQADMIN class are used to control context and alternate user security.

    例如对于队列使用一个MQQUEUE概要文件控制对该队列的访问但是mqadmin中的其他概要文件用于控制上下文用户安全性

    youdao

  • Security has been enhanced too. They have taken care of the user Account Control feature, one of the biggest annoyances of Vista users.

    系统安全提升到个新的层次,微软这次在用户账户控制中下足了功夫,这是VISTA用户曾今头疼不已一个问题。

    youdao

  • For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • Security Settings to control user access to different areas of the Web site.

    控制用户访问Web站点不同领域安全设置

    youdao

  • This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).

    本文将向介绍如何TechnologyExplorer中使用db2auth安全插件控制db2用户身份验证(参见参考资料了解db2auth的详细信息)。

    youdao

  • For portlet and page specific access control management, WebSphere Portal provides a comprehensive security management that lets you control user actions.

    Portlet页面特定访问控制管理方面,WebSpherePortal提供全面安全性管理,允许控制用户操作

    youdao

  • Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.

    使用Acegi安全性可以应用程序提供全面身份验证授权基于实例的访问控制通道安全和人工用户检测功能。

    youdao

  • While Windows 7 still focuses on security, user Account Control (UAC) is far less in your face and more user-configurable than in Vista.

    Windows7注重安全性的同时,用户账户控制(uac)将更少地弹出,并且Vista容易由用户定义。

    youdao

  • As the developer responsible for providing this underlying functionality, however, you need to configure fine-grained security and have complete control over the user interface (UI).

    然而作为负责提供基础功能开发人员需要配置细粒度安全性拥有用户界面(UI)的完全控制。

    youdao

  • The installation problem is likely caused by User Account Control security measure.

    安装问题可能用户账号控制安全措施引起的。

    youdao

  • The key point here is that Shiro's API is largely intuitive because it reflects the natural tendency for developers to think in 'per-user' security control.

    这里关键点ShiroAPI非常直观因为反映了开发者每个用户思考安全控制自然趋势

    youdao

  • We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.

    本章描述ASP和网络化制造系统安全性问题尤其是用户访问控制问题

    youdao

  • The essential security technologies of the distributed database are user authentication and access control.

    分布式数据库安全核心技术用户身份验证访问控制

    youdao

  • Finally, combining RADIUS authentication server efficiently, the port control of user access in wireless security gateway is analyzed.

    最后本文分析了有效结合RADIUS认证服务器时,无线安全网关上用户访问端口控制

    youdao

  • For example we can use user account to control a tool (UAC), should undertake appropriate after debugging, can provide the security of higher level.

    例如我们可以使用用户帐号控制工具(uac),当进行合适调试,可以提供较高水平安全性

    youdao

  • In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.

    安全模块中,使用了用户认证通讯加密审计追踪访问控制等安全技术,并且引入了模糊控制专家系统。

    youdao

  • To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.

    保护用户数据系统资源不被非法访问滥用,现代文件系统设立了文件访问控制、数据加密各种安全机制

    youdao

  • Operation results show that with this network, on-site equipment control and management becomes more convenient, which provides customers with an actual user-terminal class control of high security.

    运行结果表明网络能更好地进行现场设备控制管理实现真正用户终端安全性的控制提供一个新的解决方案。

    youdao

  • Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.

    借鉴基于角色访问控制基本思想,结合开发实践,提出一种VJ实现用户权限管理方法

    youdao

  • This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.

    安全机制有效提高访问控制模型冒充用户访问的检测控制能力

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定