訪問設置 的英文怎麼說

中文拼音 [fǎngwènshèzhì]
訪問設置 英文
access setup
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 設置 : 1. (設立) set up; put up 2. (設置) install; fit
  1. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別控制權限來實現安全和管理。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配、帳戶及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配、管理和應用方面提供了基本的框架。
  3. Where a number of units of work share the same basic set of access intents, such as all those that need the order header with the customer like a submit, cancel, and show orders method, you can create a common application profile and tune these functions together

    在許多工作單元共享相同的意圖基本時,比如所有那些需要訂單頭(如submit 、 cancel和show orders方法)的工作單元,您可以創建一個公共的應用程序概要文件,並將這些功能進行協調到一起。
  4. In chapter 4, several key techniques used in the development of the software are introduced briefly, such as the setup of the development condition, dhtml technology, active server pages ( asp ) development technology, and the interface technology, by which web server can access the back - end database

    第4章對本系統開發過程中涉及的關鍵技術作了簡要說明,重點討論了開發環境、 dhtml技術、活動服務器頁面( asp )開發技術和數據庫技術。
  5. Setting the varchar no trailing blanks column option generally improves performance, because it allows more operations to be pushed down and more optimization of the remote sql statements to encourage index access

    通過varchar _ no _ trailing _ blanks列選項通常可以提高性能,因為它允許下推更多的操作,以及對遠程sql語句的更多優化,以鼓勵索引
  6. Gets or sets a set of common access rights that map to both standard and object - specific access rights for reading, writing, and executing

    獲取或一組公共權限,這些權限映射到標準和對象特定的權限以用於讀取、寫入和執行。
  7. This section describes the two most common access control and audit scenarios : setting rules at resource creation and programmatically modifying the rules of an existing resource

    本節描述兩種最常見的控制和審核方案:在創建資源時規則和以編程方式修改現有資源的規則。
  8. For occasional usage, a more user - friendly interface might present an interactive selection screen that leads the user through conversion options providing visual feedback of options selected before performing the actual conversion

    " homes "共享時, samba將檢測哪個nt用戶在samba 。然後,它將創建一個已經為這個特定用戶定製過的主目錄共享。
  9. If custom code access security policy is set for the

    自定義代碼安全策略,以及使用
  10. The ufs system, version 2 of which was released in 2003, sets the file system limits and the basic data structures organizing raw disk access

    2003年發布的ufs系統的第2版了文件系統限制和組織原始磁盤的基本數據結構。
  11. The sql server 2005 database engine sets file access permissions on the physical data and log files of each database to specific accounts

    Sql server 2005數據庫引擎為特定帳戶了對每個數據庫中的物理數據和日誌文件的文件權限。
  12. However, the farther analysis in the paper indicates that the strategy of parameter configuration in current connection pool technique is static state with 1 - order enactment while initializes connection pool without self - optimized adjustment according as the variety of application demand, the operation results of high use frequency database are not cached and users visit the same database independently. the multi - propose connection strategy cannot control the database operation for the same transaction and cannot ensure the acid attribute, etc. in according with the defections mentioned above, the service technique of self - optimized connection pool is presented in this paper and the composing structure for self - optimized connection pool is designed, then, some strategy in dynamic parameters adjustment, transaction management and data cache for connection pool is improved

    然而,通過本文的研究分析,現有數據庫連接池技術的參數配策略是靜態的,連接池初始化時進行一次定,不能根據應用需求的變化而動態調整;連接池的核心管理機制中,沒有對使用頻率較高的數據庫操作結果進行緩存,多個用戶依然各自獨立地完成相同的數據庫;使用的連接復用策略無法控制屬于同一個事務的多個數據庫操作,不能保證事務的acid屬性等。
  13. For example, a control designer can use visual studio 2005 services to provide access to data, provide access to configuration, add controls to a page programmatically at design time, handle click events in the designer, paint on the design surface, and access other services such as designer - state

    例如,控制項計器可以使用visual studio 2005服務提供對數據的、提供對配計時以編程方式向頁面添加控制項、處理計器中的click事件、繪制計圖面和其他服務(如計器狀態) 。
  14. Explains how to access the settings and constraints editor

    解釋如何訪問設置和約束編輯器。
  15. How to : access settings events

    如何:訪問設置事件
  16. The provisioning process encountered an error while accessing the provisioning site

    過程在訪問設置網站時發生錯誤。
  17. If so, you have no choice but to work with your it department to set up a specialized proxy for sanctioned web service access

    如果這樣,您就沒有別的選擇,只能與您的it部門一道為許可web服務訪問設置專門的代理。
  18. In lotus domino 5, server access settings in the server document were not applied to users accessing the server with a web browser

    在lotus domino 5中, server文檔中的服務器訪問設置不會應用於通過web瀏覽器對服務器進行的用戶。
  19. To an object in a role denies access for a member of that role regardless of the access setting for that object in other roles to which the member belongs

    )某個對象會拒絕該角色成員的權限,而不考慮該成員所屬的其他角色中對象的訪問設置
  20. Administrators of a top - level web site can perform actions such as enabling or disabling web document discussions or alerts, viewing usage and quota data, and changing anonymous access settings

    頂級網站的管理員可以執行多種操作,例如啟用或禁用web文檔討論或警報、查看使用情況和配額數據並更改匿名訪問設置
分享友人