acls

网络  前交叉韧带; 访问控制列表; 高级生命支持; 高级心血管生命支持; 高级心脏生命支持

计算机



双语例句

  1. From there I moved on to full write operations, checkout/ checkin, relationships, and ACLs.
    然后,我以此为基础继续进行,开始全面编写操作、签出/签入、关系和ACLs。
  2. One of these goodies is some special functionality called "access control lists" or ACLs, and is now enabled on XFS filesystems by default.
    其中之一是一些名为“访问控制表”或ACL的特殊功能,现在在XFS文件系统上缺省启用这些功能。
  3. These attributes include file owner and group permissions, access-control lists ( ACLs), and extended file attributes.
    这些属性包括文件所有者及组权限,访问控制列表(ACL),以及扩展文件属性。
  4. Select the Propagate ACLs check box to allow descendants without an explicitly defined ACL to inherit from this entry.
    选择PropagateACLs复选框,允许没有明确定义ACL的后代能从这个条目中继承。
  5. With ACLs, it's possible to grant read-only and read-write access to objects, so you can easily make photos public or private, like they are on Facebook and Flickr.
    通过ACL,我们可以给对象授予只读和读写访问权限,这样您可以很容易地将照片设置为公开或私密,就像Facebook和Flickr一样。
  6. Modify the ACLs on the application databases to give users author access only.
    修改应用程序数据库上的ACL,只赋予用户作者权限。
  7. File permissions and ACLs can be monitored and fixed.
    可以监控和修改文件许可权和ACL。
  8. In my next article, we'll also take a look at some of XFS'advanced features, such as ACLs and extended attributes.
    在下一篇文章中,我们还将研究XFS的一些高级特性,譬如ACL和扩展属性。
  9. You can replicate ACLs as an entire list, not just individual entries, to remote copies of the database.
    可以把整个ACL列表(而不是单独的项)复制到数据库的远程副本中。
  10. Configure event monitoring and enable warnings generated when database ACLs are changed.
    需要配置更改数据库ACL时生成的事件监控和警告。
  11. Different proprietary systems have different mechanisms for implementing ACLs, making it difficult to exchange and share information between them.
    不同的专有系统有不同的实现ACL的机制,因此难以交换和共享信息。
  12. If you're using any other backup program, be sure to do a bit of research before using extended attributes and ACLs all over the place.
    如果您正在使用任何其它备份程序,请确保无论在何处使用扩展属性和ACL之前都做一些研究。
  13. It also works as a fully secure Kerberos-based system that uses access control lists ( ACLs) to make fine-grained access possible that is not based on the usual Linux and UNIX security models.
    它还是一个十分安全的基于Kerbero的系统,它使用访问控制列表(ACL)以便可以进行细粒度的访问,这不是基于通常的Linux和UNIX安全模型。
  14. Yes, extended attributes and ACLs are really fun, but beware& most backup programs currently still ignore EA and ACL data.
    是的,扩展属性和ACL的确很有趣,但是,当心―大多数备份程序目前仍然忽略EA和ACL数据。
  15. If the acls argument is set to true, the current users 'permissions on each resource are returned.
    如果acls参数设置为true,那么会返回当前用户在每个资源上的许可。
  16. In addition, the group name is removed from the Members list of all other groups, from the ACLs of databases, and from document Reader and Author names fields in all databases.
    此外,还将从其他所有组的Member列表中、从数据库的ACL中以及从所有数据库的文档Reader和Author姓名字段中删除这个组名称。
  17. Access Control Lists ( ACLs) determining who can access each database and to what extent.
    访问控制列表(AccessControlList,ACL)确定谁能在多大范围内访问每个数据库。
  18. Note that most of the in-depth technical information on that site is related to enabling ACL support under ext2 and ext3 ( but no additional steps are needed to get ACLs working on XFS filesystems).
    请注意,该站点上的大多数高深技术信息都同在ext2和ext3下启用ACL支持有关(但是不需要额外的步骤使ACL在XFS文件系统上工作)。
  19. With ACLs in place and the ability of the meeting owner to specify individuals and/ or groups, you take the next step in providing secure areas for people to discuss sensitive information in virtual spaces.
    ACL就绪且会议组织者具有指定个人和/或小组的能力后,下一步就是为在虚拟空间中讨论敏感信息的人提供安全区域。
  20. EAz implements ACLs as an ACL class, with permit() methods to check authorization.
    EAz将ACL实现为ACL类,并使用permit()方法检查授权。
  21. Interestingly enough, HP-UX was the first UNIX that used Access Control Lists ( ACLs) for file permissions.
    有意思的是,HP-UX是第一种使用AccessControlLists(ACL)管理文件权限的UNIX。
  22. ACLs have certain default actions ( or permissions) associated with them, but, if necessary, we can create a custom action group.
    ACL具有与其关联的特定缺省操作(或权限),但如有必要,可以创建自定义操作组。
  23. Instance-based authorization typically protects instances using access control lists ( ACLs), which are stored in some type of policy store and can be used to make access decisions.
    基于实例的授权通常使用访问控制列表(AccessControlList,ACL)来保护实例,而ACL存储在某种类型的策略存储区中,并且可用来制定访问决策。
  24. I also explained how you can centralize security administration to better control the ACLs for multiple Web services and their associated applications in the Service-Oriented Architecture ( SOA).
    还论述了用户可以如何集中安全管理来更好地控制面向服务的体系结构中的多个Web服务及其相关的其它服务和应用程序的ACL。
  25. Some file systems support advanced security features, such as access control lists ( ACLs).
    某些文件系统支持高级的安全特性,比如访问控制列表(ACL)。
  26. Using ACLs can aid in your file security by fine tuning access permissions, based on group membership, combined group membership, or by specific user ( s) only.
    通过使用ACL,可以根据组成员关系、组合的组成员关系或只针对特定的用户精细地调整访问权限,帮助提高文件安全性。
  27. How do you intend to manage the ACLs which control access to the portlets?
    您打算如何管理ACL来控制对portlet的访问?
  28. We can then add ACLs at appropriate locations in the object space, and add users or groups to those ACLs to define the available permissions.
    我们可以随后在对象空间中恰当的位置添加ACL,并将用户或组添加到这些ACL中,以定义可用权限。
  29. You can't change ACLs on this page since you have no admin rights on it!
    您不能修改此页的访问控制表(ACL),因为您没有管理权限!
  30. And one was the opportunity to be president of ACLS, because it was a chance to move.
    其中一个就是担当ACLS的主席,因为这让有了做出改变的机会。