This also grants read access to each search rule that you have read access to.
还授予对您已具有读访问权的每个搜索规则的读访问权。
This also grants read access to each presentation template that you have read access to.
还授予对您已具有读访问权的每个表示模板的读访问权。
This also grants read access to each content item that you have read access to.
还授予对您已具有读访问权的每个内容项的读访问权。
This also grants read access to each library component that you have read access to.
还授予对您已具有读访问权的每个库组件的读访问权。
Add access detail in the access list for this host.
为该主机在访问列表中添加访问细节。
Get the access intent from the access intent service.
从该访问意图服务中获得访问意图。
This also grants read access to each authoring template that you have read access to.
还授予对您已具有读访问权的每个创作模板的读访问权。
You can then access that information any time from any place as long as you have access to a computer and the Internet.
于是只要你有一台可联网的电脑,你就可以在任何时间任何地点获取你的信息。
Who can access which service? Who can access what data within each service?
哪些人能够访问哪些服务?哪些人能够访问每个服务中的哪些数据?
That means the framework will wait to access a relationship until you actually access it.
这意味着框架会一直等待访问关系直到您实际访问了该关系。
You can then access the data using standard PHP object access and methods.
然后,您就可以使用标准的PHP对象访问和方法访问数据。
This is for access, update, backup, historical access, and ease of manageability.
这样做是为了便于访问、更新、备份、历史访问和管理。
Access control ensures that only people with correct rights can access data and content.
访问控制确保只有拥有正确权限的用户才能访问数据和内容。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
The Resource access layer, which contains the logic necessary to access data.
资源访问层,包含了访问数据所必需的逻辑。
These different ways are known as access paths or access plans.
这些不同的方法就是众所周知的访问路径或访问计划。
Lightweight directory access protocol (LDAP) is a formalized directory access protocol.
轻量级目录访问协议(LDAP)是正式的目录访问协议。
Quite simply, random access is slower than sequential access.
非常简单,随机访问比顺序访问的速度慢。
Another key to scaling access control is grouping access.
另一个升级访问控制的关键是对访问分组。
To access the data, give the path of the attribute you want to access.
要访问数据,请提供需要访问的属性所在的路径。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
Access rules can be divided into two categories: read access rules and write access rules.
访问规则可以划分为两类:读访问规则和写访问规则。
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
If any of the access rules are violated, the user is denied access to data.
如果违反任意一条访问规则,则拒绝用户访问数据。
Making the correct choice between direct access and indirect access is often difficult.
要在直接访问和间接访问之间做出一个正确的选择通常都很难。
Operating system examples include file access and network access.
操作系统的示例包括文件访问权和网络访问权。
This way, you can maintain a history of who had access to the data, even if the access itself was not committed.
通过这种方式,您可以维护数据访问历史,即使访问本身没有被提交。
If the user is not entitled to access the file, the access is refused.
如果用户无资格访问该文件,则会拒绝访问。
Assume slower random data access rather than fast sequential access.
假定数据访问是较慢的随机访问而非较快的连续访问。
Obstacles remain even to universal mobile access, and beyond that to universal internet access.
不过,即便是移动电话接入,困难依然存在。普及互联网接入所面临的问题那就更多了。
应用推荐