Though, instead of outright control of access to the city, people are now talking about employing more locals.
但,与全面控制城市人口相反,人们正在讨论雇用当地人。
The degree of control of access and recording of use depends on the nature of the business and the records they generate.
存取控制与使用状况纪录的程度取决于营运的本质以及它们所产生的档案。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Two-thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want, so that they can control their own fertility.
这些文盲中有三分之二是女性,大约有2亿至2.5亿妇女无法获得她们想要的节育措施,这样她们就可以控制自己的生育能力。
Two thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want.
这些文盲中有三分之二是妇女,大约有2亿至2.5亿妇女无法获得她们想要的节育措施。
Videx of Corvallis brings intelligent access control.
位于科瓦利斯的威泰公司研发出了一种智能门禁。
With these options, the user can control the access of files and directories to copy to or from.
通过使用这些设置,用户可以控制对要复制的文件、源目录和目标目录的访问。
The key is to have some form of version control and access management to the architecture structure.
关键是要对体系结构的结构采用某种形式的版本控制和访问管理。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Provide functional and data entitlement by maintaining access control lists of users.
通过维护用户的访问控制列表来提供功能和数据权限。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
This undermines the value of the database's native access control and auditing function.
这会对数据库本机访问控制和审核功能的价值带来影响。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
When a protected table is accessed, IDS enforces two levels of access control.
当用户访问一个受保护的表时,IDS实施两个级别的访问控制。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
This level of access control provides additional administrative control, especially useful for supporting multiple organizations.
这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
Many variations of access control are possible, but in each case they are customized to the needs of the enterprise buyer.
访问控制可能存在许多差异,但每次都定制它们以控制企业买主的需求。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
The project is narrowly scoped to solve the problem of access control to avoid imposing a large and complex change patch on the mainstream kernel.
这个项目专门用于解决访问控制问题,以避免对主流内核进行大量的复杂修改。
There are some system properties that you can set to control the level of access and the way in which VM data is transmitted from the JMX agent to the management client.
可以设置一些系统属性,来控制访问级别和虚拟机数据从JMX代理向管理客户机传递虚拟机数据的方式。
The repository can categorize and provide access control for any of your submitted assets.
储存库可以分类并对提交资源提供了访问控制。
To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.
为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。
This approach obviously offers more precise control than the simple password-based authentication shown earlier, and is recommended for applications that require multiple levels of access control.
这种方法显然比前面显示的基于密码的方法提供更加精确的访问,并且推荐需要多级访问控制的应用程序使用该方法。
Wrappers allow system administrators to control access of TCP-based services or daemons that are wrappers aware.
Wrappers允许系统管理员控制 wrappers 支持的基于TCP 的服务或守护进程的访问。
Wrappers allow system administrators to control access of TCP-based services or daemons that are wrappers aware.
Wrappers允许系统管理员控制 wrappers 支持的基于TCP 的服务或守护进程的访问。
应用推荐