| 1. | Research of four - layer security database architecture based on b s mode 结构的数据库四层安全体系结构研究 |
| 2. | The designing and realization of enterprise security database system based on internet 基于网络的企业安全数据库系统的设计与实现 |
| 3. | Integrating samba users into an existing nt security database was also a nightmare 将samba用户集成到现有nt安全性数据库也象噩梦一样。 |
| 4. | Once the information is collected , it will be matched against " the appropriate security databases " prior to a travelers arrival 当接获有关资料后,美国政府便会在游客抵 |
| 5. | It maintain the security database which list all the valid user , group , and organization that comprise the secure domain 它维护安全数据库,该数据库中列出了所有有效用户、组和包含安全域的组织。 |
| 6. | One handy mode tells samba to authenticate all users against the security database of an existing windows nt or 2000 server 有一种方便的方式,它告诉samba根据现有windows nt或2000 server的安全性数据库来认证所有用户。 |
| 7. | At last , the foregoing function modules are applied to the security database manage system , and the design and realization of these modules are introduced in detail in the system 在最后,将上述功能模块应用于设计的安全数据库管理系统中,并在系统中详细介绍了这些模块的设计与实现。 |
| 8. | If you are using windows nt workstation , this username password combo must also be in the nt s local security database otherwise you won t be able to initially log in to nt 如果使用的是windows nt workstation ,这个用户名口令组合还必须在nt的本地安全性数据库中(否则就无法在最初时登录到nt上) 。 |
| 9. | With the rapid development of information and technology , database faces more serious security situation . research in the concurrency controls has been an important part in the field of security database 信息技术的迅速发展使数据库面临的安全问题更加复杂,并发控制( concurrencycontrol )是数据库安全领域的一个重要部分。 |
| 10. | It is the questions that construction a foundation database is very difficult , how to share these foundation database information system , how to design these database system . moreover , how to design a security database should be consideration 包括基础数据库建设存在的问题,基础数据库资料共享的问题,基础信息库的规划方法,基础信息库的安全与服务体系建设,基础数据库的应用系统开发方法。 |