頁面保護 的英文怎麼說

中文拼音 [miànbǎo]
頁面保護 英文
page protection
  • : 名詞(張) page; leaf Ⅱ量詞(面) page
  • : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 頁面 : page frame
  1. A web application requires protection for vulnerabilities on page static data ; for example form action, links, buttons, and hidden fields

    Web應用程序要求靜態數據中的漏洞,如操作、鏈接、按鈕和隱藏欄位。
  2. That is another issue which is not discussed here

    關于內容的問題我們不在這里贅述。
  3. Password protecting, redirect users automatically, error pages, change file extensions, block certain ip addresses, or allows certain sessions to view certain pages

    密碼,自動跳轉,找不到,改變文件的擴展名,過濾指定的ip地址,允許指定的繪畫程序訪問指定
  4. Because portal pages are resources that are protected by portal access control, there x references may still exist to those deleted pages in the portectedresourcecache

    因為門戶是受門戶訪問控制的資源,所以portectedresourcecache中仍然可能存在對這些刪除的的引用。
  5. Securing only the login page with websphere and secure sockets layer

    用websphere和secure sockets layer來登錄
  6. Do you really want to protect this page

    你確實要這個
  7. You can narrow down the view by selecting a log type, the user name, or the affected page

    綜合顯示上傳,刪除,,查封以及站務日誌。你可以選擇日誌類型,用戶名或者相關來縮小查詢范圍。
  8. If a user has been granted a role with a specific role type for a specific resource, that user is automatically allowed the same level of access on all descendent resources within the protected resource hierarchy that is, nested sub - pages through role inheritance

    如果授予用戶的角色具有特定資源的特定類型,則自動允許用戶通過角色繼承同級訪問受資源層次結構內的所有派生資源(即嵌套的子) 。
  9. Rtos - 1750 make use of static memory management to implement memory protection provided by page register ' s memory mapping and bpu ( block protect unit ), with which system keep fast reference as well as relatively independence by the technology of strding - mapping. system manages inner interrupt and outer interrupt by priority classing strategy and provides four type timers, which are system timer, software timer, auxiliary timer and real - time timer

    系統充分利用1750a提供的寄存器堆的內存映射功能和塊單元( bpu )提供的存儲器功能,採用靜態內存管理方式,既證了任務之間的相對獨立,又通過跨段映射技術滿足了dcmpofp中的任務快速引用的要求。
  10. The auth - constraint element is used to specify constraints for an authenticated user account that must be met prior to accessing protected pages

    Auth - constraint元素用於指定對通過認證的用戶帳戶的約束,這些約束必須在訪問受之前得到滿足。
  11. If the page you are currently viewing is secure, information about its privacy certificate will be shown below

    如果您目前查看的受到,其私人證書將顯示在下
  12. Upload, post, publish, transmit, reproduce, or distribute in any way, information obtained through the website which is protected by copyright, or other proprietary right, or create derivative works with respect thereto, without the prior written permission of the copyright owner or rightholder

    上載、發帖、發布、傳輸、復制、或以任何方式派發從本網取得的受版權或其他所有權的資訊,或者未經著作權人或權利持有人事先的書許可而就該等資訊作出衍生作品。
  13. We first give an analysis of the whole system and its requests for memory management then we design and implement the memory management strategies of rtos for this chip, including the paged virtual memory management mechanism without swap, the memory protection, the memory sharing and the static / dynamic memory allocation mechanism. chapter 4 describes the simulation method of the memory management strategies implemented in the previous chapter, then we analyse the results of the simulation

    首先對系統進行了分析,得到其對操作系統的存儲管理的具體要求,然後針對上提出的需求,設計並實現了相應的存儲管理策略,包括分不交換的虛擬存儲機制、存儲、存儲共享以及內存的靜態動態分配機制,最後介紹了在本系統研究和實現過程中用到的幾個工具軟體。
  14. In summary, the team learned the following about securing specific pages in a websphere portal deployment

    總的來說,團隊學習了以下關于在websphere portal部署中特定的內容。
  15. First, the category of copyright under internet circumstance is introduced ; second, comparison and distinguish for the related copyright behavior have been made under internet circumstance ; third, three restrictions of fair use, legal use and implied permission are considered to exist in copyright under internet circumstance ; forth, the internet copyright infringements are classified to three forms by the author ; traditional style infringing upon internet style, internet style infringing upon traditional style and infringements among internet styles. in the infringements among internet styles, three circumstances of web page plagiarism, hypertext link and reprint on internet are analyzed emphatically. the fifth is to probe into the infringement responsibility of internet service provider ; isp and icp ; sixth, three paths for protecting internet copyright are discussed ; technology measure, organization ste p and legal way

    本文從七個方論述了網路環境下的著作權問題:一是介紹了網路環境下著作權的范疇;二是對網路環境下若干相關著作權行為作了比較區分;三是認為網路環境下的著作權存在著「合理使用」 、 「法定許可」和「默示許可」三方的權利限制;四是歸納了網路著作權的侵權情況,認為存在傳統形式侵犯網路形式作品著作權、網路形式侵犯傳統形式作品著作權以及網路形式作品之間的著作權糾紛三種形式,在網路形式的作品著作權糾紛中又重點分析了網抄襲、超文本鏈接和網路轉載三方的侵權情況;五是探討了網路服務提供者isp和icp的侵權責任;六是從技術手段、組織措施和法律途徑三方討論了網路著作權可以尋求的途徑,分析了技術手段這種十分有效的私力救濟途徑的兩性:合理性與對公眾利益的妨礙性。
  16. As we stated in the challenge of this paper, the goal of this project was to have the flexibility to secure a small number of pages that contain customer sensitive information without the operational overhead of having to ssl - enable every page

    正如我們在本文「挑戰」部分開頭所提到的,本項目的目標是能夠靈活地包含客戶敏感信息的少量,而不會有對每個都啟用ssl而帶來操作開銷。
  17. Of course you can ' t protect the content of the page with this script alone, because cut and paste still would print work here

    當然,你不能僅靠這段腳本程序來你的內容,因為「剪切」 、 「粘貼」功能仍然可以發揮作用。
  18. Paging activity occurs at apc _ level and thus limits arbitrary re - entrancy in order to prevent calling code paths that could generate yet more page faults

    調度活動出現在apc _ level ,因此為了也可能產生更多的錯誤的調用代碼路徑,它限制了任意重入。
  19. Securing specific portal pages is possible

    特定門戶是可能的。
  20. The framework covers the logical security aspect of a web application and protects static data on the web page

    這個框架覆蓋了web應用程序的邏輯安全方,並了web中的靜態數據。
分享友人