back access 中文意思是什麼

back access 解釋
背徑小路
  • back : n 1 背,背部;背脊;背面,反面;背後,後部,後面,裏面。2 (指)甲;(刀)背;(手)背;(書)背...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽器;它們包括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於訪問控制授權需求的屬性。
  2. 8 door cabinets are provided with back access panel to access utilities service channel. access panels are removable with simple tools

    櫃門後背板可用簡單工具方便地拆卸下來以檢修管路系統。
  3. In chapter 4, several key techniques used in the development of the software are introduced briefly, such as the setup of the development condition, dhtml technology, active server pages ( asp ) development technology, and the interface technology, by which web server can access the back - end database

    第4章對本系統開發過程中涉及的關鍵技術作了簡要說明,重點討論了開發環境設置、 dhtml技術、活動服務器頁面( asp )開發技術和數據庫訪問技術。
  4. In this case, i need to map from the regulation data back to the aggregating object the employee to check access

    在這種情況下,我需要從規章數據映射回聚合對象(雇員)來檢查訪問。
  5. 10 base cabinet supported on four leveling screws adjustable in toe base. base cabinet has the removable type back used for access to the plumbing to chase area

    所有底櫃有四個可調螺絲支撐,並調節水平。櫃門後背板可用簡單工具方便地拆卸下來以檢修管路系統。
  6. On the other hand, boundary - scan technique intelligent fault diagnostic method was applied to practice. for most digital system, devices with boundary - scan architecture are broadly used. only using four line or five line to connect pc parallel port with cut tap ( test access port ), all the ptvs can be loaded to cut and all homologous prvs can be taken back to intelligent fault diagnosis system

    至於本文採用邊界掃描測試故障診斷技術,是考慮到本系統的通用性和簡潔性,因為對于大多數數字系統而言,具有邊界掃描結構的器件己廣泛應用,本文只需4條或5條信號線就能將pc機和被測邊界掃描電路連接起來,由此極大地簡化了智能故障診斷系統中為實現ptvs加載和prvs獲取而專門設計的介面板電路。
  7. Otherwise, the legacy disk access interface is used as a fall - back, and it cannot be used to address any location on the disk higher than the 1023rd cylinder

    否則會使用舊的傳統磁盤訪問介面,而且不能找到任何大於1023的柱面。
  8. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  9. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  10. All rooms have air conditioning and heating, bathroom and large kang - style beds that are heated in winter. 24 - hour reception, lobby, laundry service, restaurant, car rent, back up generator, non - smoking rooms, bar, parking, multilingual staff, fax, tourist service, currency exchange, shoe shine, umbrella, internet access in public areascsurcharge, coffee shop, bicycle rental, library reading room area

    客棧風格傳統獨特,保持了原汁原味的明清古建築風貌,深幽的巷道久遠的上馬石拴馬柱,典型的二進式四合院考究的垂花門樓精美的雕刻及彩繪傳統的土炕古色古香的明清傢具走進客棧,彷彿走進了歷史中,那種古樸雅緻溫馨舒適的感覺油然而生,使人流連忘返。
  11. Pressured by a boycott among some high - profile scientists in 2001, certain journals began offering free public access to back issues a year or more after publication

    2001年,在一些知名科學家的杯葛施壓下,某些刊物開始提供已出版一年或超過一年的過期刊物,供大眾免費閱覽。
  12. " there ' s no access here, you can ' t go on. you ' ll have to turn back.

    「這里禁止入內,你們不能再走過去了。你們得轉回去。 」
  13. No nationwide studies document the trend, but anecdotally, doctors and physical therapists say that as portable computers become cheaper, more powerful, smaller and lighter, and as wireless internet access becomes ubiquitous, thousands are suffering persistent back, shoulder, wrist and neck aches

    沒有全國性的研究證實此趨勢,但非正式談話中,醫師和物理治療師表示,隨著移動式電腦越來越便宜、威力更強大、體積更小更輕,以及無線上網管道變得無所不在,數以千計的人飽受持續性背部、肩膀、手腕和頸部疼痛之苦。
  14. The second one is how can we capture the data just before they are sent out or received in. the third one is how can we inform our monitor or debugger process this event, transfer the data to the monitor or debugger, and get the results back. as far as microsoft windows operation system is concerned, which mostly has been installed on personal computers and partly server cmputers, softwares access data in internet through windows socket application program interface

    就被廣泛安裝在個人計算機和一部分服務計算機的微軟視窗操作系統而言,軟體通常通過操作系統提供的套接字網路介面訪問網路數據,在視窗操作系統上有兩套網路介面,一是由伯克勒大學設計,被稱之為bsd套接字的介面,由阻塞同步和非阻塞異步以及輪循機制控制輸入和輸出工作;另一套是微軟公司開發的窗口套接字,由網路消息事件驅動。
  15. Organizations that depend on access to computational power to advance their business objectives often sacrifice or scale back new projects, design ideas, or innovations due to sheer lack of computational bandwidth

    依靠計算機能力來進行業務活動的組織經常要放棄新項目、構思或者新思路,就是因為太缺乏計算帶寬。
  16. Discussions on pseudo - ceiling in downward piling access back - filling mining method

    下向分層進路式充填采礦法假頂護頂途徑探討
  17. The viewer connects back to the web server or a streaming server on the same machine to access the networked video

    查看器連接回web服務器(或者同一臺機器上的流媒體服務器) ,訪問網路視頻。
  18. Without access to key ingredients from their homeland, chinese immigrants working on the central pacific railroad in the 1860s improvised dishes like chow mein and chop suey that nobody back in their native land would have recognized

    在19世紀印年代,在美國修建鐵路的中國移民工人在缺少家鄉原材料的情況下,自創了一些諸如炒麵、炒雜燴等美式中國菜,這些菜在中國估計是沒人見過的。
  19. To guard against dns spoofing of host names in the access table, one can enter all hosts by ip address, or request that the server resolves ip addresses back to original host names to make it more difficult for someone to intercept dns requests and answer them

    要防止訪問表中主機名被dns電子欺騙,可以輸入所有主機的ip地址,或請求服務器將ip地址解析回原始主機名來使其他人截獲dns請求和回答更困難。
  20. Cue / review control allows easy forward or back access to any part of the tape

    不出所料/前進或回審查管制允許容易獲取任何部分錄音帶
分享友人