Returns the access control security for the current registry key.
返回当前注册表项的访问控制安全性。
The installation problem is likely caused by User Account Control security measure.
安装问题可能是由用户账号控制安全措施引起的。
Access control security strategy is to preserve the legality of the database users.
访问控制策略即保证数据库的访问者其身份的合法性。
They have had effective control of the area since the security forces left.
自从安全部队离开后,他们实际控制了这一地区。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
Lots of business people think they want fine-grained control of each field's security characteristics.
许多业务人员都认为他们需要对每个字段的安全特性进行精细控制。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
The database security administrator has tight control on the role membership.
数据库安全管理员对角色从属关系有严密的控制。
But in the cloud, a company has no control over the security measures adopted.
但是,进入了“云端”,公司就失去了对自己原有的安全措施的控制力。
They are also a message control point in an application's security architecture.
它们还是应用程序安全体系结构中的消息控制点。
It also relates to space property, overall security, and arms control.
此外,草案还涉及了太空资产、全球安全以及武器控制等方面。
Security to control who can write to or read from a queue.
控制谁可以向队列中写以及谁可以从队列中读的安全性。
For more precise security control, you should.
要获取更精确的安全控制,您应该。
Security is also an issue; SimpleDB's access control system is similar to S3's.
安全性也是一个问题;SimpleDB 的访问控制系统类似S3。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
Here are the control variables that influence SaaS security focus.
下面是影响SaaS安全关注点的一些控制变量。
Here are the control variables that influence PaaS security focus.
下面是影响PaaS安全关注点的一些控制变量。
GSS-API enables application control over security.
GSS - API允许应用程序控制安全。
A security and access control model that distinguishes between these two classes of users.
区分上述两类用户的安全和访问控制模型。
It solves the problems of function extension and security control.
解决了功能扩展与安全控制的实现问题。
We believe that we can control the security in all cities in Palestine .
我们相信,我们可以控制在巴勒斯坦所有城市的安全。
“Things are happening outside the cities beyond our control,” says a PA security official.
在我们鞭长莫及的城市以外出现了情况。
Secondly, we analyze the essence of the security in the access control.
其次,认真分析了访问控制安全性的本质。
The research of access control model is a topic of information security area.
访问控制模型是信息安全领域研究的重点之一。
Identity authentication and access control are the major security mechanisms to defend active attack.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
Duty Manager is responsible for the security control of the hotel keys whilst on duty.
在当班时,值班经理根据安全需要负责控制酒店的钥匙。
Do management or security personnel control the issuance of all the locks and keys?
所有的锁及钥匙是否有安全人员或管理人员负责控管?
At the same time we can set up different authority for different client and build security control software to guarantee the whole tank area information security.
同时,通过划分用户权限,编制安全控制软件,保证了整个罐区信息系统的安全。
Meanwhile another Iraqi province has been handed over to local security control.
同时,又一个伊拉克的省被移交给当地防卫部门控制。
Meanwhile another Iraqi province has been handed over to local security control.
同时,又一个伊拉克的省被移交给当地防卫部门控制。
应用推荐