Access of CONTROL or ALTER, on the other hand, means that there is no MQI security for that connection.
另一方面,CONTROL或ALTER访问意味着那个连接没有MQI安全性。
Two-thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want, so that they can control their own fertility.
这些文盲中有三分之二是女性,大约有2亿至2.5亿妇女无法获得她们想要的节育措施,这样她们就可以控制自己的生育能力。
Two thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want.
这些文盲中有三分之二是妇女,大约有2亿至2.5亿妇女无法获得她们想要的节育措施。
Videx of Corvallis brings intelligent access control.
位于科瓦利斯的威泰公司研发出了一种智能门禁。
With these options, the user can control the access of files and directories to copy to or from.
通过使用这些设置,用户可以控制对要复制的文件、源目录和目标目录的访问。
The key is to have some form of version control and access management to the architecture structure.
关键是要对体系结构的结构采用某种形式的版本控制和访问管理。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
Provide functional and data entitlement by maintaining access control lists of users.
通过维护用户的访问控制列表来提供功能和数据权限。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
This undermines the value of the database's native access control and auditing function.
这会对数据库本机访问控制和审核功能的价值带来影响。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
When a protected table is accessed, IDS enforces two levels of access control.
当用户访问一个受保护的表时,IDS实施两个级别的访问控制。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
This level of access control provides additional administrative control, especially useful for supporting multiple organizations.
这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
Many variations of access control are possible, but in each case they are customized to the needs of the enterprise buyer.
访问控制可能存在许多差异,但每次都定制它们以控制企业买主的需求。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
The project is narrowly scoped to solve the problem of access control to avoid imposing a large and complex change patch on the mainstream kernel.
这个项目专门用于解决访问控制问题,以避免对主流内核进行大量的复杂修改。
Reuse of existing container features, such as access control and transaction management.
重用现有容器功能,如访问控制和事务管理。
The repository can categorize and provide access control for any of your submitted assets.
储存库可以分类并对提交资源提供了访问控制。
To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.
为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。
This approach obviously offers more precise control than the simple password-based authentication shown earlier, and is recommended for applications that require multiple levels of access control.
这种方法显然比前面显示的基于密码的方法提供更加精确的访问,并且推荐需要多级访问控制的应用程序使用该方法。
As in pattern 3, the mashup hub can be used to transform the data (filter, restructure, or sort) and to enable access control of protective data sources.
和模式3中一样,可以使用mashuphub转换数据(过滤、重构或排序),并支持对受保护数据源的访问控制。
We'd heard that the access control of Drupal can be more granular, but figured we could deal with that using the flexible extensibility.
有人认为Drupal的访问控制粒度应该更细,但是我们认为可以利用灵活的可扩展性应对这方面的问题。
Wrappers allow system administrators to control access of TCP-based services or daemons that are wrappers aware.
Wrappers允许系统管理员控制 wrappers 支持的基于TCP 的服务或守护进程的访问。
Security and management: Provides a single point of control, access, and validation of web service requests.
安全和管理:提供Web服务请求的单点控制、访问和验证。
应用推荐