Enter "account" as the name for the field, select the protected access qualifier, then click OK.
输入“account”作为字段名,选择protected访问限制符(accessqualifier),然后点击OK。
Default security is set to WiFi Protected Access 2 (WPA2), requiring users to enter a randomly chosen password to connect to the Internet.
这套WiFi系统默认使用WAP2协议,用户想要接入这个WiFi网络需要输入随机密码。
Because clone has protected access in Object and, to call clone , you have to call it through a reference to a class that has overridden clone to be public.
因为clone在Object中是保护访问的,调用clone必须通过将clone改写公共访问的类引用来完成。
Developer shall create a password protected access site to make the Web site available for review by the Customer periodically through the development stage.
开发方应创建由口令保护的网站入口,以便客户在开发阶段能够定期对网站进行审核。
WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it's best to use a WPA password instead.
一个WEP(有线等效加密)加密的密钥不如一个WPA(无限上网保护接入)加密的密钥来的有效。
A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it's best to use a WPA password instead.
WEP (wiredequivalentprivacy)编码的密码不如WPA (wi - Fiprotected access)密码强健,所以最好使用WPA密码替代它。
Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.
大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
My experience is that you should always strive to make accessors protected, so only subclasses can access the attributes.
我的经验是应该总是使读写方法受保护,所以只有子类可以访问其属性。
Access to protected resources on this region is based on the RACF user profile and its group membership.
对该区域受保护资源的访问基于RACF用户个人文件及其群组成员关系。
If the user attempts to access any of the protected resources, the sample application presents the login page.
如果用户试图访问任何受保护的页面,样例应用程序将显示登录页面。
Put each test case in the same package as the class it's testing to gain access to package and protected members.
将每个测试实例与它要测试的类放在同一个包内,以获得对包成员和保护成员的访问权。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
RP grants access: The user is granted access to the protected resource.
RP授予访问权:授予用户对受保护资源的访问权。
When a user tries to access protected data, that user's security label is compared to the security label protecting the data.
当一个用户试图访问受保护的数据时,该用户的安全标签将与用于保护该数据的安全标签相比较。
Access to most computers and services is typically protected.
通常,对大多数计算机和服务的访问都受到保护。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
For example, if a non-authenticated user attempts to access a protected resource, ETF serves the login page inviting the user to authenticate.
比如,如果一个没有进行身份验证的用户试图访问受保护的资源,ETF将显示一个登录页面要求用户进行身份验证。
Be sure to remember the master password or you will be unable to access any information protected by it!
确保记住主密码,否则无法访问它保护的任何信息!
An application may need to impose additional, finer-grained controls that further restrict access to protected resources.
应用程序可能需要强制实行附加的、更细粒度的控制,以进一步严格控制对受保护资源的访问。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
Request to access a protected resource: The user attempts to access a protected resource on the RP's Web site.
请求访问受保护资源:用户试图访问RP网站上的受保护资源。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
Protected files, which controls access to certain files used by a build system.
ProtectedFiles,控制对构建系统使用的某些文件的访问。
If you want access to protected content, you will also have to let the Windows Media Digital Rights Management talk home.
如果你想要获得保护的内容,你同样需要让Windows媒体数字版权管理访问微软。
To access protected data in a change management system such as Rational Team Concert, you typically must furnish a user name and password.
为了访问RationalTeamConcert之类变更管理系统中受保护的数据,通过重复使用已存在的标准您必须能够完善用户名字和密码。
应用推荐