• The startup's product enables older adults who may not be comfortable with computers to access email, video chat and social media using just their televisions and a remote control.

    这家初创公司的产品可以让可能习惯使用电脑老年人只用电视机遥控器收发电子邮件视频聊天使用社交媒体

    youdao

  • For some organizations, access control to projects may not be a significant issue.

    对于一些组织项目访问控制也许不是一个重要问题

    youdao

  • As you can see, the mechanism provided here can implement a very fine-grained type of access control.

    正如看到那样,这里所提供机理可以实施一种非常精细访问控制

    youdao

  • The driving motivation behind this extension is to allow us to separate access control into a generalized framework that USES policies based on ownership and special relationships.

    推动这种扩展的动力允许我们访问控制分离一个通用框架框架使用基于所有权特定关系的策略

    youdao

  • As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.

    作为一项最佳实践隐藏中的部分行的时候,应该使用视图控制访问

    youdao

  • Create a portable and standard way of describing access control entities and their attributes.

    创建一种可移植标准方式来描述访问控制实体及其属性

    youdao

  • Each of these application roles aggregates a set of very specific portal access control roles.

    其中的每个应用程序角色聚合非常特定门户访问控制角色。

    youdao

  • Apart from the rendering, it behaves like a default portal page, such as for access control.

    除了传递表现就像一个默认门户页面例如访问控制

    youdao

  • Singletons are a useful way to control access to a class, making sure that only one instance can exist.

    单例模式有用的控制访问途径他能保证只有个类实例存在。

    youdao

  • However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.

    不过不必担心安全问题因为文件系统访问控制机制通常都可以提供充分的保护。

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

  • It makes for easier management of host and user control access from a system administrators point of view.

    系统管理员角度来看,这样容易管理主机用户访问控制

    youdao

  • As a best practice, consider using stored procedures as a way to control access to your data.

    作为一项最佳实践应考虑使用存储过程控制数据访问

    youdao

  • In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.

    当前以网络为中心业务模型中,验证个人身份控制访问维护数据完整性保密性变得越来越

    youdao

  • This requires RACF to use several different profiles in various classes to control access to a resource.

    要求RACF不同使用几个不同概要文件控制资源访问

    youdao

  • What happens when the everyday user tries to access a control that is authorized only for administrators?

    用户每天都访问授权管理员的控制权时,会发生什么

    youdao

  • For example, POP3's single mailbox model can lead to thousands of large messages in a single location, making access and control of the mailbox a tedious affair.

    例如POP3单一邮箱模型导致数千大型消息都处于一个位置从而使得邮箱的访问控制成了件麻烦事

    youdao

  • A typical access control and authorization scenario includes three main entitiesa subject, a resource, and an action — and their attributes.

    典型访问控制授权场景包括三个主要实体主体资源和动作以及它们的属性

    youdao

  • Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.

    主题访问控制通常发布引擎基于主题层次结构中的访问控制列表进行管理

    youdao

  • An online policy is used for encrypting data written to a file system and protecting data with access control.

    在线策略用于加密写到文件系统数据以及通过访问控制保护数据。

    youdao

  • If access to projects is a concern, then you can create security policies that control access to certain groups.

    如果项目访问您所关注的,那么应该创建安全策略控制一定能够访问项目。

    youdao

  • While this is not the place for a thorough discussion on access control, you will need some idea about how users and groups are applied to files.

    虽然在这里我们不能详尽地论述访问控制,不过应该用户文件的访问权限初步的了解。

    youdao

  • As a best practice, consider using LBAC as a way to control access to sensitive data.

    作为最佳实践应考虑使用LBAC作为控制敏感数据访问的一种方法

    youdao

  • It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.

    确保脚本可以安全执行提供一个沙箱控制DOM访问修改

    youdao

  • Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.

    访问控制细粒度的访问控制可能必须的,通过一个数据库查找特定于应用程序的授权服务调用实现。

    youdao

  • Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.

    测试访问帮助查明未授权用户是否能够成功访问只有管理员有权使用控件

    youdao

  • For example, you need to control access to EJBs using a network-safe encrypted token.

    例如需要使用网络安全加密令牌控制ejb访问

    youdao

  • Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?

    访问一个未经授权用户能成功访问只有经过授权管理员才能使用的控制权吗?

    youdao

  • A myriad of tools are required to provide the proper IT governance and access control at a macro level.

    提供适当IT治理全面的访问控制需要使用许多工具

    youdao

  • For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.

    但是目前继续展示如何使用Acegi配置一个简单访问控制策略

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定