access log 中文意思是什麼

access log 解釋
訪問日誌
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • log : n 1 原木,圓木,乾材。2 測程儀,計程儀。3 航海日誌,(飛行員用的)航海日誌;旅行日記。4 〈英國〉...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. Napier had simplified computational tasks, but ready access to books of log tables was crucial to the procedure

    納皮爾簡化了計算工作,但手邊必須有對數表手冊才能進行計算。
  3. If you change browsers or access britannica online traditional chinese edition from another workstation, you will need return to this page and log in again

    假如您更換瀏覽器或是使用它臺工作站讀取大英百科全書線上繁體中文版,您將需要重回此網頁並重新登入。
  4. Write enable to change a cube or dimension so that users in cube roles with read write access to the cube or dimension can change its data. write - ahead log

    一種數據挖掘技術,分析現有數據,並使用結果來預測新記錄的屬性值或現有記錄中缺少的屬性值。
  5. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源訪問進行控制、控制超鏈接錨點鏈接信息的泄漏、控制瀏覽器書簽功能對頁面的訪問等頁面資源訪問控制安全措施。
  6. The sql server 2005 database engine sets file access permissions on the physical data and log files of each database to specific accounts

    Sql server 2005數據庫引擎為特定帳戶設置了對每個數據庫中的物理數據和日誌文件的文件訪問權限。
  7. Log books are kept to record all refusals of the data access and correction requests and the particulars of the reasons for the refusals

    備存保障資料紀錄簿,以記錄所有被拒絕的查閱和改正資料要求,以及詳盡的拒絕理由。
  8. Access to a recovery log is only performed when the exclusive lock is held

    對恢復日誌的訪問只有在持有排它鎖定時進行。
  9. As a member of the marco polo club, simply log in to access the members area

    管理您的里數馬可孛羅會會員請登錄瀏覽會員專區。
  10. Component is configured to access the new event log

    組件將配置為訪問新的事件日誌。
  11. If your internet service provider requires you to use secure password authentication ( spa ) to access your news server, select the log on using secure password authentication option

    如果您的internet服務提供商要求您使用安全密碼驗證( spa )才能訪問新聞服務器,請選擇「使用安全密碼驗證進行登錄」選項。
  12. You can also use cmp enterprise javabeans to wrap the audit log table and allow users to access information via the dynamic ejb query language

    您也可以使用cmp enterprise javabeans來包裝那些審核日誌表,並允許用戶通過動態的ejb查詢語言來訪問這些信息。
  13. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。
  14. This thesis discusses the research and development on some critical parts in airspace management and evaluation system, including mainly the following contents : design the architecture of airspace management and evaluation system. design and realize the event log middleware and event log module based on middleware technology. design and realize the core and nodus of airspace management and evaluation system - airspace data access based on object oriented technology and nested table technology

    本文對空域管理與評估系統的一些關鍵問題進行了研究和開發,主要包括以下幾個方面的內容:設計空域管理與評估系統的體系結構提出並實現了基於中間件技術的日誌中間件及日誌維護模塊採用面向對象技術和嵌套表技術設計和實現了空域管理與評估系統中的核心和難點? ?空域數據訪問
  15. During designing and implementing system, the following problems are also solved, controlling sharing access, creating performance log file, maintaining performance information

    另外,在系統的設計、實現過程中還解決了性能數據的維護方式和共享訪問控制,以及性能日誌文件的生成、性能分析的輔助處理等多項問題。
  16. The web usage mining mines web log records to discover users access patterns of web pages

    Web訪問挖掘是通過分析web訪問日誌來發現用戶訪問web頁面的模式。
  17. For the backup jobs and copy jobs to succeed, they must have access to the log shipping backup folder

    若要使備份作業和復製作業成功,它們必須都能訪問日誌傳送備份文件夾。
  18. To prevent such problems from occurring, websphere application server uses network file locking technology to ensure exclusive access to recovery log files

    要避免這樣的危險發生, websphere application server使用網路文件鎖定技術來確保對恢復日誌文件的排它訪問。
  19. Read or write access to event log services

    對事件日誌服務的讀或寫訪問權。
  20. Please log in or register to access my ups

    請登入或注冊以存取我的ups . com 。
分享友人