• Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.

    传统桌面环境中用户数据常常存储用户设备上,这会在用户私有信息公司智能资产安全性方面造成问题

    youdao

  • Finally, the XC10 appliance provides fine-grained user and user group permissions for administrative tasks and data grid security.

    最后XC10设备针对管理任务数据网格安全提供细粒度用户和用户权限

    youdao

  • When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.

    另一个用户需要访问文件时,在授予数据访问权限之前,将验证安全凭据使这些文件数据已经明文格式存在内存中。

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

  • For security, a unique user id and password needs to be configured on the XC10, which will be used by the XI50 to access the data grid.

    为了安全起见,需要XC10配置唯一的用户ID密码XI50使用它们访问数据网格

    youdao

  • Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.

    接下来使用者希望了解SaaSPaaSIaaS用户资源数据请求安全策略安全关注重点是什么

    youdao

  • Get the TGT for the user in Microsoft realm and use it to access the NFS exported data with krb5 security residing on IBM NAS realm.

    Microsoft领域获得用户TGT使用通过IBMNAS领域中的krb5安全访问NFS导出数据

    youdao

  • Like Facebook today, it was criticized for its policies on privacy, security and willingness to sell user data, as well as its use of its own proprietary tools.

    就像今天Facebook,美国在线在隐私政策安全出售用户数据使用自有专门工具等方面备受指责。

    youdao

  • Work is now going on in the SAE to automate the end-user feedback collection and support a level of community moderation compliant with enterprise data governance and security policies.

    SAE中的相关工作现在正在进行,自动化形式收集最终用户反馈支持某种遵从企业数据治理和安全策略的修改级别

    youdao

  • The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.

    客户机虚拟化优点提供更高数据安全性更容易管理减少最终用户停机时间确保业务连续性

    youdao

  • We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.

    我们会中分享关于云端网络本地端点安全防护方法了解如何保护“身处各地用户数据

    youdao

  • Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.

    安全确保组件系统保证用户信息机密性数据完整性授权的允许性。

    youdao

  • At the same time, due to the lack of user data backup and other data security knowledge and means, it will result in the loss of recurring information and other phenomena.

    同时由于用户缺乏数据备份数据安全方面知识手段因此造成经常性信息丢失现象发生

    youdao

  • Such security measures include backing up data to other servers and encrypting user passwords.

    这些安全措施包括其它服务器备份数据用户密码加密

    youdao

  • Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.

    人员用户帐号系统策略数据保护病毒防治制定了详细安全措施

    youdao

  • In the design process, system security and data integrity are ensured by user authentication and encryption respectively.

    设计过程中通过对用户认证数据加密机制来确保系统安全性数据完整性

    youdao

  • In a traditional P2P distributed storage of data for all users are open, but with the increase of sharing resources and user scales, there will exist some security problem.

    传统P 2p分布式存储数据对于所有用户都是公开的,随着共享资源用户数量增多存在安全问题。

    youdao

  • If you expect more than one user to access the data, and you want each retrieval to the data to be verified by the security configurations for the database, do not use caching.

    如果希望数据多个用户访问并且要求数据库安全配置验证每个数据的检索,请不要使用缓存

    youdao

  • In order to avoid system crashes and data loss accidents caused by software vulnerabilities, the security and reliability of storage management software are most concerned about the user.

    为了避免由于软件漏洞导致系统崩溃数据丢失意外发生,存储软件产品的安全性可靠性成为目前用户关心的问题。

    youdao

  • To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.

    保护用户数据系统资源不被非法访问滥用,现代文件系统设立了文件访问控制、数据加密各种安全机制

    youdao

  • The accuracy, consistency and security of database data, as maintained by the RDBMS throughout all user access.

    为了满足所有用户访问数据库数据关系型数据库管理系统( RDBMS)维护数据库数据的准确性一致性安全性

    youdao

  • These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.

    进一步地介绍数据库验证外部验证、企业验证并发许可用户验证和许可限制。

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定