| 1. | Database objects and access privileges 数据库对象和访问特权 |
| 2. | Standard guide for information access privileges to health information 健康信息的信息访问特权的标准指南 |
| 3. | Always give a predetermined user name the minimal access privileges to a resource 始终将资源的最少访问特权给予预设用户名。 |
| 4. | Supplier ' s confidentiality obligation survives termination of its access privileges 供应商所应承担的保密责任在其访问特权终止后仍将继续存在。 |
| 5. | In order to deploy to a web server , you must have administrative access privileges for that computer 要部署到web服务器,您必须对该计算机拥有管理访问特权。 |
| 6. | Is displayed and a message box is shown to the user , indicating they did not have appropriate access privileges ,并向用户显示一个消息框,指出他们没有相应的访问特权。 |
| 7. | If you have questions about your access privileges , please contact the titled individual you designated in your pin request for that account 如果您对访问特权有疑问,请联络您在该帐户的pin请求中指定的负责人。 |
| 8. | By default , services run in a different security context than that of the logged - in user . services run in the context of the default system account , called 的默认系统帐户的上下文中运行,该帐户给服务提供的系统资源访问特权不同于给用户提供的。 |
| 9. | Supplier ' s confidentiality obligation with respect to each datum of information obtained from cg survives termination of its access privileges and continues until the datum becomes public knowledge 终止供应商的访问特权后,归还了其从cg获取每个数据信息的机密职责,直到数据成为公共信息后才能继续其职责。 |
| 10. | This second installment covers inventory assessment , risk analysis , identifying user categories and access privileges , and then moves on to a more detailed action plan and steps for safely acquiring a linux distribution 第2部分涵盖了清单评估、风险分析、确定用户类别和访问特权,以及安全获得linux发行版本的更详细行动计划和步骤。 |