授權管理員 的英文怎麼說

中文拼音 [shòuquánguǎnyuán]
授權管理員 英文
authorized administrator
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 員名詞1. (指工作或學習的人) a person engaged in some field of activity 2. (指團體或組織中的成員) member Ⅱ量詞(用於武將)
  • 授權 : empower; authorize; warrant
  • 管理員 : administrative officer
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統力和責任,包括物安全、系統配置、帳戶設置及使用限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、和應用方面提供了基本的框架。
  2. You as the authorized administrator need the configuration client to define a security policy and define network objects and log on to the firewall

    ) ,用戶作為授權管理員,需要配置客戶來定義安全策略(和定義網路對象以及登錄防火墻) 。
  3. This administration authorization token will be used extensively

    令牌將被廣泛的使用。
  4. Note that this helper method obtains the profile manager using the administration authorization token

    注意到這個方法包含了利用令牌的代
  5. It s just a matter of getting a forum factory with the administration authorization token, then calling

    這個方法僅僅是獲得一個帶有令牌的論壇工廠,然後調用這個論壇工廠的
  6. The approval admin can do one of the following 1 approve 2 reject 3 cancel or 4 assign the request

    可以做以下幾件事之一: 1 )批準2 )拒絕3 )取消或4 )分配請求。
  7. Be authorized to manage the employee ' s attendance and the personal disciplines on the site

    授權管理員工出勤和個人在崗的紀律情況。
  8. Install this update to ensure that authorization manager - enabled applications work after you install windows server 2003 service pack 1

    安裝這個更新可以確保安裝了windows server 2003 service pack 1之後,啟用授權管理員的應用程式可以順利運作。
  9. The authorization token passed to the forum factory determines with what permissions the rest of the objects in the system will be accessed ; because the administration authorization token is used, all jive objects will be accessed with full permission

    傳遞給論壇工廠的令牌決定所創建的對象在系統中的訪問等級;由於利用了令牌,因此可以完全訪問所有的jive對象。
  10. For example, a computer s administrator can establish security policy that allows all code downloaded from a web site and signed by a given software company to access a database on a computer, but does not grant access to write to the computer s disk

    例如,一臺計算機的可以建立這樣一種安全策略:它允許從某一網站下載由指定軟體公司簽發用以訪問計算機上的數據庫的所有代碼,但不予對該計算機磁盤的寫訪問
  11. What happens when the everyday user tries to access a control that is authorized only for administrators

    當用戶每天都試著訪問僅的控制時,會發生什麼?
  12. This policy is intersected with policies defined by the administrator at the enterprise, computer, and user levels to determine the full set of permissions granted to the code

    也會在企業、計算機和用戶級別定義一些策略,以確定向代碼予的全部限,這些策略和應用程序域安全策略之間存在相交的情況。
  13. Security policy is established by the enterprise and the computer s administrator as well as by user policy settings, and determines the set of permissions that is granted to all managed code when executed

    安全策略是由企業和計算機的以及用戶策略設置建立的,它在執行時確定向所有託代碼予的限組。
  14. Johndoe has authentication to go to the users area but not the admin area, because he isn t a member of the administrators role, as defined in geronimo - web. xml

    Johndoe有進入用戶區的但是沒有進入區的,因為他不是角色的成(在geronimo - web . xml中定義的角色) 。
  15. After pass - through privileges are granted, the affected users such as those belonging to the group managers in the above example can use the pass - through facility

    予了pass - through限之後,受影響的用戶(例如前面例子中那些屬于組的用戶)就可以使用pass - through功能。
  16. For optimal control of permissions granted to the service, the domain administrator can create a new account for the instance of notification services

    為了對予此服務的限進行最佳控制,域可以為notification services實例創建新帳戶。
  17. Though the episode ii script made no reference of any mandalorian heritage, the expanded universe turned him into a mandalorian everyman, using jango to tie the enigmatic culture into the newly revealed reality of the clone wars

    他咨詢盧卡斯部的資料庫利蘭?契,新編出與過去大相徑庭的曼達洛故事線,並為詹高?費特寫了一篇背景故事。
  18. A database role can be granted administrator permissions, process object permissions, view object metadata permissions, and permissions to view or modify data at multiple levels within each analysis services database

    數據庫角色可以被限、處對象限、查看對象元數據限以及在每個analysis services數據庫內查看或修改多個級別的數據的限。
  19. The original equipment manufacturer determines the platform security level of the device and its security policy and can also provide a security administrator with custom permissions for granting access

    原始設備製造商( oem )確定設備的平臺安全級別和安全策略,還可以為安全提供用於予訪問的自定義限。
  20. Vecon - janitor realizes 7x24 automated car park operations while optimizing vehicle security management and providing greater cost and operational efficiency for car park management companies

    全智能控制,可隨時增加刪除及修改車輛資料,減低系統維護成本。
分享友人