Returns the specified sections of the access control security for the current registry key.
传回目前登录机码之存取控制安全性的指定区段。
The ability to embed business logic into documents empowers enterprises to control security at the document level.
把业务逻辑嵌入文档的能力使企业能够在文档级控制安全性。
In that case a completely different team than the team that administers WebSphere MQ would control security for the queue manager.
对于这种情况,可以由WebSphereMQ管理团队之外的团队来控制队列管理器的安全性。
It is also pointed out that global warming, variation of extremes of forms and floods will impact the flood control security of China.
指出由于全球气候变暖对暴雨洪水极值的影响,将极大地影响我国的防洪安全。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
The special project department is specialized in the design, installation, debugging and maintenance of building fire control security systems.
特种工程部专业从事建筑物消防安全系统的设计、安装、调试及维护工作。
Separate the areas in the element security control cube by target area definitions and by IF statements according to the business logic you need.
根据您需要的业务逻辑,按照目标区域定义和IF 语句分离元素安全性控制多维数据集中的区域。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
This security framework example will control the functions presented to the user.
此安全性框架示例将控制呈现给用户的功能。
Interceptors are a special kind of invokers that provide additional function, such as data transformation, security, and transaction control.
拦截器是一种特殊的调用器,它提供其他的功能,比如数据转换、安全性和事务控制。
This feature is intended to improve security and to control accessibility.
这个特性的用途是提高安全性和控制可访问性。
The costs must not exceed the benefits of a security control.
付出的成本绝对不能超过安全控制所带来的优势。
Gates said the transition to Afghan control of security operations will begin in the country's more stable regions, and will be done gradually and as local conditions allow.
盖茨说,向阿富汗移交安全控制工作将在这个国家比较稳定的地区开始,而且将在当地条件许可的情况下逐步进行。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Document services include document generation, collaboration, document control, archival support, and security.
文档服务包括文档生成、合作、文档控制、文档支持和安全。
It may come down to branding issues, control, or job security; we just don't know.
它可以归结为品牌问题、控制或就业保障;问题出在哪里我真的不知道。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.
DB 2对数据库访问的性能和安全特性施加细粒度的控制—因此需要更细致的处理。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
This module also comes with a pre-built spam control and security features.
这个模块还附带预先构建的垃圾控制和安全特性。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
This allows project managers to better control costs, manage security, and allocate resources to clouds a project is assigned to.
这样项目管理人员可以更好地控制成本、管理安全问题和分配资源。
If the costs are high, you may need to change the security control for less money.
如果成本太高的话,可能需要改变安全控制来节省资金。
Increasing the training of the Iraqi police and military forces so they can assume control of security.
加强伊拉克警察和武装力量的训练,让他们能够承担安全保障任务。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
There is a limit to how much you can control your job security. So bolstering your cash may be your best bet for boosting your morale.
你如何掌控你的职业安全是有限度的,所以能让你斗志高涨的最好办法就是支持现金。
Originally designed for consumer use, these devices typically lack security, control and auxiliary management tools.
这些设备本来是作为消费级应用的产品,因此普遍缺乏安全,控制以及辅助管理工具。
Originally designed for consumer use, these devices typically lack security, control and auxiliary management tools.
这些设备本来是作为消费级应用的产品,因此普遍缺乏安全,控制以及辅助管理工具。
应用推荐