Password protected access to the application.
密码保护访问应用程序。
Enter "account" as the name for the field, select the protected access qualifier, then click OK.
输入“account”作为字段名,选择protected访问限制符(accessqualifier),然后点击OK。
Default security is set to WiFi Protected Access 2 (WPA2), requiring users to enter a randomly chosen password to connect to the Internet.
这套WiFi系统默认使用WAP2协议,用户想要接入这个WiFi网络需要输入随机密码。
Because clone has protected access in Object and, to call clone , you have to call it through a reference to a class that has overridden clone to be public.
因为clone在Object中是保护访问的,调用clone必须通过将clone改写公共访问的类引用来完成。
Developer shall create a password protected access site to make the Web site available for review by the Customer periodically through the development stage.
开发方应创建由口令保护的网站入口,以便客户在开发阶段能够定期对网站进行审核。
WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it's best to use a WPA password instead.
一个WEP(有线等效加密)加密的密钥不如一个WPA(无限上网保护接入)加密的密钥来的有效。
A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it's best to use a WPA password instead.
WEP (wiredequivalentprivacy)编码的密码不如WPA (wi - Fiprotected access)密码强健,所以最好使用WPA密码替代它。
Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.
大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
My experience is that you should always strive to make accessors protected, so only subclasses can access the attributes.
我的经验是应该总是使读写方法受保护,所以只有子类可以访问其属性。
Access to protected resources on this region is based on the RACF user profile and its group membership.
对该区域受保护资源的访问基于RACF用户个人文件及其群组成员关系。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Private objects are protected by user access key.
私有对象由用户访问密钥保护。
RP grants access: The user is granted access to the protected resource.
RP授予访问权:授予用户对受保护资源的访问权。
When a user tries to access protected data, that user's security label is compared to the security label protecting the data.
当一个用户试图访问受保护的数据时,该用户的安全标签将与用于保护该数据的安全标签相比较。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
These keysets provide read and write access to the data protected by their keys.
这些键集通过它们的键,提供了对保护数据的读写权限。
For example, if a non-authenticated user attempts to access a protected resource, ETF serves the login page inviting the user to authenticate.
比如,如果一个没有进行身份验证的用户试图访问受保护的资源,ETF将显示一个登录页面要求用户进行身份验证。
An application may need to impose additional, finer-grained controls that further restrict access to protected resources.
应用程序可能需要强制实行附加的、更细粒度的控制,以进一步严格控制对受保护资源的访问。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
Request to access a protected resource: The user attempts to access a protected resource on the RP's Web site.
请求访问受保护资源:用户试图访问RP网站上的受保护资源。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
Protected files, which controls access to certain files used by a build system.
ProtectedFiles,控制对构建系统使用的某些文件的访问。
To access protected data in a change management system such as Rational Team Concert, you typically must furnish a user name and password.
为了访问RationalTeamConcert之类变更管理系统中受保护的数据,通过重复使用已存在的标准您必须能够完善用户名字和密码。
Limited access to protected and package (default access) components.
受保护和打包(缺省接入)组件的有限接入。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
应用推荐