• It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.

    文中介绍DB 2UDB安全模型包括用户身份验证、用户授权以及超级用户。

    youdao

  • If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.

    如果建立模型对于预测用户请求延时非常有效,不一定发现安全漏洞。

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • Part 1 of this article series presents the DB2 security model, and discusses how user and group accounts interact with DB2 for Linux, UNIX, and Windows (DB2).

    系列第1部分介绍DB 2安全性模型讨论了用户帐户如何DB 2Universal Database (udb)交互

    youdao

  • It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.

    重要的是理解当前安全模型用户角色权限应用程序功能

    youdao

  • Based on the user request model, several problems about CTI embedded in MIS, such as security and flow of information, are discussed in this paper.

    本文探讨CTI技术MIS中的一些应用问题,重点用户诉求模型信息安全设计、信息流设计软件设计。

    youdao

  • This security grid model ensures that the legal user can access grid resouces;

    安全模型保证合法用户可以访问网格资源;

    youdao

  • Network Management; Network Security; Network Performance; User Behavior Management; Model Credibility.

    网络管理;网络安全;网络性能用户行为管理;信誉度

    youdao

  • This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.

    安全机制有效提高访问控制模型冒充用户访问的检测控制能力

    youdao

  • User - Based Security Model?

    基于用户安全模型USEC ?

    youdao

  • User - Based Security Model?

    基于用户安全模型USEC ?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定