access lists 中文意思是什麼

access lists 解釋
通過訪問控制列表
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • lists : 鬥技場
  1. The repositories are called access control lists acls

    這種資料庫稱為訪問控制鏈表( acl ) 。
  2. In discretionary access control lists dacls are removed

    的任何審核ace將被移除。
  3. Is handled by the access control lists for the file resource in the underlying file system

    的身份驗證由基礎文件系統中的文件資源的訪問控制列表處理。
  4. Access control lists let you define fine - grained permissions for files

    訪問控製表讓您定義細粒度的文件許可權。
  5. Permissions are set using access control lists

    權限是使用訪問控制列表設置的。
  6. Access control lists acls are used to ensure that internal users and customers see appropriate content

    用訪問控制清單( acl )保證內部用戶和客戶看到的是不同的內容。
  7. It provides access to detailed process data and precise control functions across the plant, providing operators with customized data including alarm lists, process graphics, control faceplates and trend displays

    它可以在整個工廠里訪問具體的過程數據和精確的控制功能,向操作員提供定製的數據,包括警報列表、過程圖表、控制面板和趨勢顯示。
  8. Enhance compliance by online access to the most current u. s. government lists

    通過在線訪問美國政府最新公布的名單幫助您遵守規定
  9. Of this series, i talked about how to set up access control lists acls and the impact of the size of acl entries on uptime availability as specified in a service - level agreement guarantee

    ,我討論了怎樣建立訪問控制列表( acl )以及acl入口大小對服務級別協議( sla )保證中規定的正常運行時間可用性的影響。
  10. Asp. net controls access to site information by comparing authenticated credentials, or representations of them, to ntfs file system permissions or to an xml file that lists authorized users, authorized roles groups, or authorized http verbs

    通過將已驗證憑據或它們的表示形式與某些內容進行比較, asp . net可以控制對站點信息的訪問;這些內容可以是ntfs文件系統權限,也可以是列出了已授權用戶、已授權角色(組)或已授權http謂詞的xml文件。
  11. What are two reasons that a network administrator would use access lists ? ( choose two

    網管使用訪問列表的原因是哪帶個
  12. Which router command allows you to view the entire contents of all access lists

    哪一條命令會顯示出所有的訪問列表條目?
  13. Not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    ( 8 )每位用戶都不得利用慧學英語軟體和服務發連環信、垃圾郵件、惡意郵件攻擊、不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  14. H not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    8每位用戶都不得利用cleverlearn軟體和服務發連環信垃圾郵件惡意郵件攻擊不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  15. The next incredibly cool samba 2. 2 feature is its new support for access control lists, or acls

    Samba 2 . 2另一個不可思議的絕妙特性是對訪問控製表( acl )的新支持。
  16. Full coverage of access control lists is beyond the scope of this article, but you can find a great introduction to acls on the bestbits site see

    全面討論訪問控製表超出了本文的范圍,但是您可以在bestbits站點(請參閱
  17. One of these goodies is some special functionality called " access control lists " or acls, and is now enabled on xfs filesystems by default

    其中之一是一些名為「訪問控製表」或acl的特殊功能,現在在xfs文件系統上預設啟用這些功能。
  18. I ll guide you through the process of setting up xfs on your own system, as well as cover xfs tuning tips and useful xfs features like acl access control lists and extended attribute support

    中,我將全程指導您在自己的系統上設置xfs ,並講述了xfs調優技巧和諸如acl (訪問控製表)及擴展屬性支持之類有用的xfs特性。
  19. The inclusion of both field - level and instance - level access control lists satisfies the requirement for a thorough access - control mechanism

    包含有欄位級和實例級訪問控制列表滿足了完全的訪問控制機制的需求。
  20. To access the latest source code, binaries, and an active community on the mailing lists and wiki

    的官方站點,以訪問最新的源代碼、二進制文件,以及郵寄列表和wiki上的活動社區。
分享友人