訪問被拒絕 的英文怎麼說

中文拼音 [fǎngwènbèijué]
訪問被拒絕 英文
access denied
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (被子) quilt 2 (姓氏) a surname Ⅱ動詞[書面語]1 (復蓋) cover; spread 2 (遭受) suffe...
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  1. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成( denialofservice )等對計算機系統造成危害的行為。
  2. Permission, allow you specify additional restrictions that narrow the access that is granted or denied

    權限)允許指定附加限制,這些限制縮小了授予或權限范圍。
  3. Identifies the trustees that are allowed or denied access to a securable object

    標識允許或可保護對象的受信者。
  4. The etl metadata includes everything involved in etl process design, etl process execution history, rejected data process records, schedule information, data growth and storage management records, and user data access records

    Etl元數據包括etl過程設計、 etl過程執行歷史、的數據過程記錄、調度信息、數據增長和存儲管理記錄,以及用戶數據記錄中所涉及的所有東西。
  5. Not really a big deal if you re denied access to your mail or stock quotes

    如果您只是郵件或股票報價,這並不是大題。
  6. The system checks the access control entries in sequence until it finds one or more that allow all the requested access rights or until any of the requested access rights are denied

    系統按順序檢查控制項,直到找到一個或多個允許所有請求的權限的項,或者直到所有請求的權限均
  7. You are not allowed to access the requested page based on firewall web access rules

    基於防火墻的網頁策略,你的訪問被拒絕
  8. Exception is thrown to indicate that access was denied

    異常,以指示訪問被拒絕
  9. Access is denied and a security exception is raised

    訪問被拒絕,並引發安全異常。
  10. Method is made while the process is currently terminating, a

    方法,則將會因訪問被拒絕而引發
  11. Access to the specified file was denied

    對指定文件的訪問被拒絕
  12. Access is denied to the port

    對埠的訪問被拒絕
  13. Acce denied because username and / or pa word is invalid on the domain

    訪問被拒絕是因為在本局域網中用戶名或者密碼無效。
  14. Makes it impossible for your code to be used to access the denied resource

    使得您的代碼不可能用來訪問被拒絕的資源。
  15. Access denied because username and / or password is invalid on the domain

    訪問被拒絕是因為在本局域網中用戶名或者密碼無效。
  16. Access is denied

    訪問被拒絕
  17. It is composed of two aspects : first, it uses the java sandbox to control the access of host resource, thus it can prevent the host resource from being accessed by agents without authority ; second, it adopts a authentication based mobile agent transfer protocol to control the transfer of agents in order to refuse the transfer request of invalid agent. thus, it can guarantee that the agent running in the host is valid, in other words, it avoids performing the illegal agent in the host. further more, it can be sure that the agent status data have n ' t been tampered or replaced in the course of transfer

    該方案主要包括兩個方面內容:一、利用java2沙箱控制主機資源的存取,防止主機資源移動代理非授權;二、採用一種基於證書的移動代理遷移協議,對移動代理的遷移過程進行控制,不合法移動代理遷移至主機的請求,確保主機上運行的移動代理具有合法身份,並且確保移動代理遷移狀態數據在遷移過程中不篡改或替換。
  18. A security descriptor lists the users and groups that are granted or denied access to an object, and the specific permissions assigned to those users and groups

    安全描述符列出授予或對象的用戶和組,以及指派給那些用戶和組的特定權限。
  19. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能竊取和篡改,惡意代碼,和服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工有意和無意的、修改一些他們沒有權限的數據。
  20. Our new idea makes the users queue in the buffer at the time of peak access to avoid the economic losses for the sake of refusing client - side access in the case that no buffer is available at the repository " s side. as argued in this report, the new method reduces the peak loads of repository effectively

    該方法在存儲庫的峰值期間,讓大量並發用戶在緩存器中排隊,避免了crl請求因無緩沖而立即帶來的經濟損失,而且,有效降低存儲庫的峰值負荷。
分享友人