The first and most important addition was access protection for methods and instance variables on classes -- the public, protected, and private keywords.
第一个也是最重要的新特性是针对类的方法和实例变量的访问保护 ——public、protected 和private 关键字。
Vacuum distillation using the dropper with the exhaust port and the access protection tube to prevent leakage of liquid directly into the vacuum pump.
减压蒸馏使用带抽气口和防护滴管的接液管,可以防止液体直接泄露到真空泵中。
Programs running inside the SPU need to be rather simplistic and self-contained, so you don't need complicated access protection or different privilege modes in the SPU itself.
在SPU内部运行的程序需要非常简单,而且是自包含的,因此在SPU中并不需要复杂的访问保护或不同的优先级模式。
As a customer of predefined workflows provided by Oracle, you can use access protection to preserve valid customizations you have made to a predefined workflow during a workflow definition upgrade.
作为甲骨文提供的预定义工作流,你可以利用访问控制权限来保护你对工作流的有效的客户化升级。
The rivalry between access providers offers the best protection against the erection of new barriers to the flow of information online.
访问供应商之间的竞争提供了对抗线上信息流设置新障碍的最好保护。
This level of protection lets the application allow or restrict other applications to access the system resource.
这种级别的保护让应用程序允许或限制其他应用程序访问系统资源。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
The fastest-growing data is archive data, which is ideal for cloud storage given a number of factors, including cost, frequency of access, protection, and availability.
增长速度最快的数据是归档数据,鉴于很多因素它是云存储的理想之选,这些因素包括成本、访问频率、保护和可用性。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
When this mapping occurs, the hardware takes care of access (and protection), and the guest operating system can use the device as if it were a non-virtualized system.
当这种映射发生时,硬件将负责访问(和保护),客户操作系统在使用该设备时,就仿佛它不是一个虚拟系统一样。
Additional access control is required for fine-grained protection of the assets associated with that service.
对与该服务相关联的资产的细粒度保护还需要其它访问控制。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
This security feature provides robust protection against unwanted intrusion and provides designated users easy access to documents that they should see.
该安全特性为防止有害入侵提供了强力保护,并且能够使指定用户方便地访问其应该查看的文档。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
It says many are in urgent need of health and educational services, nutritional support, access to clean water and sanitation, as well as protection.
该机构说,这些无家可归的儿童中许多人急需卫生和教育等服务、以及营养支持、有洁净水和卫生设备,并且急需得到保护。
Trojan protection - Detecting access to Trojan horses.
特洛伊木马防护——对 特洛伊木马进行检测。
Effective support for abused and abandoned children requires functioning child protection systems that ensure children's access to psycho-social, health and educational services, and to justice.
对遭遇虐待的流浪儿童进行有效的保护,为达到这一目标,我们还需要有运作正常的儿童保护体系为儿童提供心理社会、健康和教育以及司法服务。
In general, the Encrypted Files system (EFS) support on AIX enables individual users on the system to encrypt their data and also access it through keyed protection.
总的来说,AIX上的EncryptedFilesSystem (EFS)支持让系统上的用户可以加密他们的数据,还可以在密钥的保护下访问数据。
If necessary, we could also add a Protected object Policy (POP) to any object, which adds additional protection, such as time-of-day access rules.
如有必要,我们还可以向任何对象添加受保护对象策略(Protected Object Policy,pop),从而提供额外的保护,如时段访问规则等。
The Advanced Access Control Feature implements label-based access control (LBAC) to offer row-level and column-level protection.
AdvancedAccessControlFeature实现了基于标签的访问控制(LBAC),以提供行级和列级保护。
If countries believe they will have easy access to IMF money when trouble arrives, they may choose collective protection over self-insurance.
如果在危机出现时,一些国家认为他们会很容易地得到IMF的资金,那这些国家就可能会放弃自我保护,采取集体防御的手段抵制危机。
Some rich countries have large populations without access to care because of inequitable arrangements for social protection.
由于不公平的社会保护安排,一些富裕国家有大量人口不能获得保健。
There is a growing recognition that, in low-income countries, stronger IP protection is a barrier to access to medicines.
越来越多的人认为,在低收入国家,较强的知识产权保护是获得药品的障碍。
"Rich countries have to lead - by reducing agricultural protection, by cutting high manufacturing tariffs, and by expanding access to affordable medicines," says Stern.
斯特恩说:“发达国家必须带头,减少农产品保护,降低工业品的高关税,扩大价格适当的药品的准入。”
We will push for the recognition of norms of behavior in cyberspace, and otherwise work with global partners to ensure the protection of the free low of information and our continued access.
我们将推动对网络空间行为规范的认同,并与全球伙伴合作确保信息的自由流动和访问通畅。
We will push for the recognition of norms of behavior in cyberspace, and otherwise work with global partners to ensure the protection of the free low of information and our continued access.
我们将推动对网络空间行为规范的认同,并与全球伙伴合作确保信息的自由流动和访问通畅。
应用推荐