• All the securable resources have a better than null security descriptor.

    所有安全资源一个安全描述更好的描述符。

    youdao

  • Eventually, reasonable and securable drilling mud destiny of different blocks can be ascertained.

    最后综合考虑确定出各个区块的合理安全泥浆密度窗口。

    youdao

  • Every securable object has permissions that can be granted to a principal using permission statements.

    每个可保护对象都具有使用权限语句授予主体权限

    youdao

  • Impersonation allows the thread to interact with securable objects using the client's security context.

    模拟允许线程安全对象交互客户端的安全上下文。

    youdao

  • By default, the system USES the primary token when a thread of the process interacts with a securable object.

    默认情况下,系统令牌进程线程一个安全对象相互作用时

    youdao

  • This built-in function tests whether the current principal has a particular effective permission on a specified securable.

    内置函数测试当前主体对于指定安全对象是否具有特定有效权限

    youdao

  • It is found that results of the traditional reliability method are less securable and those of fuzzy-random reliability method are more reasonable.

    结果分析表明传统可靠度分析结果偏于不安全,利用模糊随机可靠度来评价边坡稳定状况趋于合理性。

    youdao

  • In addition to these object-specific access rights, there is a set of standard access rights that correspond to operations common to most types of securable objects.

    除了这些对象特定访问权限外,还有标准访问权限,这些权限与大多数安全对象类型共有的操作对应

    youdao

  • In addition to these object-specific access rights, there is a set of standard access rights that correspond to operations common to most types of securable objects.

    除了这些对象特定访问权限外,还有标准访问权限,这些权限与大多数安全对象类型共有的操作对应

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定