您要查找的是不是:
- Absolutely must get access to the protected resource in order to work? 一定要访问受保护的资源才能工作怎么办?
- For a complete list of all of the get and set methods for each protected resource, see Technology Summary for ACLs. 有关每个受保护资源的所有get和set方法的完整列表,请参见ACL技术摘要。
- Permissions are simply objects that represent the right to access a protected resource. 权限就是表示访问受保护资源的权利的对象。
- Comparatively speaking, it is more difficult to require uncivilized people to protect resource. 相对而言,要求没有受过教育的人保护资源是较困难的。
- The count is then decremented from that level as the protected resource is consumed. 当被保护的资源被消耗时,其计数值会被减少。
- True, the current permission object represents no more access to the protected resource than does the specified permission object. 则当前的权限对象所表示的对受保护资源的访问不会超过指定的权限对象。
- As with all synchronization mechanisms, you must ensure that all code paths wait on the appropriate wait handle before accessing a protected resource. 与所有同步机制一样,您必须确保在访问受保护的资源之前所有代码路径都在正确的等待句柄上等待。
- For this, must alter understanding, take cogent and significant step reasonable use and protect resource. 为此,必须改变认识,采取切实有效的措施合理利用和保护资源。
- Normally when code attempts to access a protected resource, a stack walk is performed to ensure that all stack frames have permission to access the resource. 通常情况下,当代码尝试访问受保护的资源时,将执行堆栈审核,以确保所有堆栈帧都有权访问该资源。
- Demands are usually used in class libraries to help protect resources. 要求通常在类库中用来帮助保护资源。
- The classes in the System.Security.AccessControl namespace allow you to programmatically create or change discretionary access control lists (DACLs) and system access control lists (SACLs) associated with a protected resource. 通过System.;Security
- The answer to this question affects the way you design the variables that represent the state of the permission and determines whether administrators can configure access to the protected resource. 此问题的答案将影响您设计表示权限状态的变量的方式,并确定管理员是否能够配置对受保护资源的访问权。
- The size of this cache scales with the number of protected resources accessed by the active users in the system. 这种缓存的大小与系统中活动用户访问的受保护资源的数量保持适当的比例。
- Transparent assemblies can be accessed from partially trusted code and cannot expose access to any protected resources or functionality. 透明程序集可以从部分受信任的代码访问,并且不能公开对任何受保护资源或功能的访问。
- Demands and overrides are used in libraries to help protect resources from callers or to override default security behavior. 要求和重写在库中用来帮助防止调用方调用资源或重写默认安全行为。
- The objective of PA construction is not to protect resources, but to enclose land and expand the land power of departments and local government. 保护区建设,目的不是保护资源,而是圈地,扩大部门或地方政府的土地权力。
- Code access permissions are permission objects that are used to help protect resources and operations from unauthorized use. 代码访问权限是用于帮助保护资源和操作不被未经授权地使用的权限对象。
- They netted the fruit trees to protect them from birds. 他们用网覆盖住果树以使其免遭鸟害。
- When the runtime establishes that code has a certain level of trust, it allows the code to access protected resources appropriate to that level of trust. 在运行库证实该代码有某一级别的信任时,它就允许该代码访问对于该信任级别合适的受保护资源。
- It strengthen the security of resources by the technique of separating the manage site and the filter,and the filter is flexibly placed to the outside of the protected resources. 利用管理站-过滤器分离技术,把透明过滤器灵活地布置到被保护资源的外部边缘,对网络离散资源进行精确隔离,提高了安全性。