• All APM systems access performance data sources and include facilities for collecting and tracing.

    所有APM系统能访问性能数据源提供数据收集跟踪实用工具

    youdao

  • Implementation of Enterprise Information Systems access in Service-Oriented Architecture: a bottom-up approach.

    实现面向服务体系结构企业信息系统访问底向上方法。

    youdao

  • The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.

    业务需求完全不同系统之上提供内部应用程序访问遗留系统中的企业数据库

    youdao

  • The codes—which typically range in price from $80 to $155 per course—give students online access to systems developed by education companies like McGraw Hill and Pearson.

    这些访问码的价格通常门课程80美元155美元之间不等,学生需要通过这些访问码才能在线使用麦格劳·希尔培生等教育公司开发系统

    youdao

  • Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.

    入侵者入侵系统可能是出于这两个原因之一为了获取他们应该拥有信息或者为了改变系统行为

    youdao

  • All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them.

    很多情况下,破坏简单失误造成的,比如未能包含敏感数据系统需要访问这些数据的系统分离开来。

    youdao

  • The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.

    用户必须用户出口路径配置目录使用主机系统文件访问控制确保容易受到攻击

    youdao

  • This includes functions such as loading and removing classification systems, and setting up access control policies.

    包括诸如加载删除分类系统以及设置访问控制策略等功能

    youdao

  • Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.

    描述位置系统访问方法数据流通更新频率、数据安全性和数据质量

    youdao

  • Access to other operating systems.

    访问其他操作系统

    youdao

  • Similar inequalities exist in the coverage of immunization systems and access to good schools, in access to credit and even in coverage of the law.

    免疫系统覆盖率方面,在进入好的学校获得贷款方面甚至在法律覆盖率方面,都存在着类似的不平等现象”。

    youdao

  • Answer: With a J2EE application, all users of the application use the same login to access backend systems.

    对于J2EE应用程序所有用户使用同样登录信息访问后端系统

    youdao

  • The lack of proper systems to access and manage their information assets can cripple an organization.

    缺乏适当用来访问管理企业信息资产系统可能会给企业带来损害

    youdao

  • That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.

    就是说通过欺骗在组织工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • In proprietary access control systems, information about these entities and their attributes is kept in repositories.

    专有访问控制系统中这些实体及其属性信息保存资料库中

    youdao

  • Continuing with the processes theme, operating systems virtualize access to the underlying resources of the machine to processes.

    继续讨论进程操作系统将对机器底层资源访问虚拟化为进程。

    youdao

  • That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.

    就是说通过欺骗在组织中工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • Typically, this is the IP through which systems administrators access a node.

    通常系统管理员通过这个IP访问该节点

    youdao

  • Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.

    大多数操作系统使用访问控制判断一个实体(用户程序)是否能够访问给定资源

    youdao

  • They also had detailed knowledge of Siemens’s industrial-production processes and control systems, and access to the target plant’s blueprints.

    他们掌握了西门子工业生产流程控制系统详细资料,可以看到目标工厂设计图

    youdao

  • It has provided access to POSIX-like systems.

    提供类POSIX系统的访问

    youdao

  • By separating the memory and processor, systems will have access to a larger memory pool with better scalability which could help boost application performance, IBM said.

    IBM称,通过内存处理器分离开来,系统将会利用大的内存更好的扩展性从而达到提升应用程序性能的目的。

    youdao

  • As well, you get access to operating systems and various middleware and software products.

    同样可以访问操作系统各种中间件软件产品

    youdao

  • A password policy is put in place to ensure the systems that users access are secure.

    密码策略用来确保用户访问系统安全性

    youdao

  • Major challenges include poor living and public health conditions, largely destroyed disease monitoring and containment systems and limited access to some of the worst-hit areas.

    目前面临主要困难生活公共卫生条件差疾病监控体系大面积受损、进入受灾严重地区的渠道有限等问题。

    youdao

  • A customer had several lines of businesses that required access to legacy systems.

    一个客户多条需要访问遗留系统业务线。

    youdao

  • Now you need to create an account on AIX for the Systems Director database access and schema.

    现在需要AIX创建一个帐户用于SystemsDirector数据库访问架构

    youdao

  • They are often crucial parts of high volume transactional systems and have access to sensitive data.

    它们往往是事务性系统关键部分

    youdao

  • They are often crucial parts of high volume transactional systems and have access to sensitive data.

    它们往往是事务性系统关键部分

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定