限制策略

  • 网络Restriction Policy;APCP
限制策略限制策略
  1. 本文从身份验证、基于对象的访问控制、审核策略、软件限制策略、加密文件系统、安全策略、公钥基础结构、Internet协议安全性等不同层面上讨论了Windowsserver2003的安全机制。

    This article discussed the security mechanism of Windows Server 2003 , include identity validate , access control , Software Restriction Policy , Encrypting File System , security policy , Public Key Infrastructure , Internet Protocol Security , etc.

  2. 通过对多版本数据库模型(DBV方法)和CSCW(计算机支持的协同工作)的分析比较,提出了面向CSCW的DBV方法的限制策略,描述了如何利用多版本数据库技术构造一个CSCW工作模型。

    By analyzing multi-version database model ( called DBV ) and CSCW ( Computer Supported Cooperative Work ), some limitations on DBV are put forward in order to use it in CSCW . Then it is described how to create CSCW work model by using DBV technology .

  3. 删除在该组策略对象定义的所有软件限制策略吗?

    Delete all software restriction policies defined in this group policy object ?

  4. 一种基于软件限制策略的U盘病毒防范方法

    Method to Prevent Virus Based on Software Restriction Policies

  5. 这是旧版的软件限制策略功能上的重大的体系结构改进。

    This is a significant architectural enhancement over the legacy Software Restriction Policies feature .

  6. 删除软件限制策略前,请关闭所有软件限制策略属性页。

    Close all Software Restriction Policy property pages before deleting the Software Restriction Policies .

  7. 不支持软件限制策略。

    Software restriction policies is not supported .

  8. 单击软件限制策略。

    Click Software Restriction Policies .

  9. 在“将软件限制策略应用于下列用户”下,单击“除本地管理员以外的所有用户”。

    Under apply software restriction policies to the following users , click all users except local administrators .

  10. 第二章我们研究了限制策略参数空间对量子博弈的影响。

    In chapter two , we study the influence of the constraint in the parameter space on quantum games .

  11. 安装时,计算机中所有文件的软件限制策略的默认安全级别全都设置为无限制。

    At installation , the default security level of software restriction policies on all files on your computer is set to unrestricted .

  12. 对于与复合状态兼容的每一种元数据类型,子状态机中的每一个转换都有一个限制策略。

    For each metadata type compatible with a composite state , every transition in the sub-state machine has a policy for restriction .

  13. 结果表明,实施缓存限制策略前后,分布式模型比集中式模型均有更好的性能。

    Simulation result showed that the distributed model was more efficient than the central model no matter it worked under buffer-restricted policy or not .

  14. 要使软件限制策略生效,用户必须从他们的计算机上注销然后再次登录以更新策略设置。

    For software restriction policies to take effect , users must update policy settings by logging off from and then logging on to their computers .

  15. 在确定最优车道限制策略的基础上,本文又着重分析了不同驾驶员服从率和坡度下,这些车道限制方案的实施效果。

    Then , after identifying the optimum lane restriction strategies of different freeways , the thesis analyzes traffic operations under different driver compliance rates and gradients .

  16. 第三章我们介绍了博弈在不公平限制策略空间中的性质(对于参与者双方的策略空间的限制是不一样的)。

    In chapter three , we study the quantum games where the players have different strategic spaces ( The restrictions to players ' strategic spaces are different ) .

  17. 在样本含量一定的条件下,随着缺失比例的增大,三种识别限制策略参数估计结果的标准误越来越大。

    When the sample size is fixed , along with the increasing of the missing proportion , the standard errors of the parameter estimates under these three model identification restrictions become larger and larger .

  18. 注意:如果默认的级别不被允许,对库文件应用软件限制策略要求您为一个程序使用的所有库文件设置规则,才能使用此程序。

    Note : if the default level is disallowed , applying software restriction policies to libraries requires you to set rules for all the libraries used by a program in order to use the program .

  19. 系统主要通过编写策略来管理域内软件资源的合法使用。利用组策略设置软件安装策略、软件限制策略和进程限制策略来对域内链接这些策略的对象统一管理。

    The system manages software resources in the domain mainly through programmed policies , and uses Group Policy to configure software installation policy ; software restricted policy and process restricted policy . The system applies these policies to the specified objects for unified management to enhance security in the domain .

  20. 在后一个子问题中,采用了参与控制集和部分变量的可控区间限制等策略来提高线性规划问题的计算有效性。

    In the latter sub-problem , the candidate control group strategy and the controllable region limitation strategy are used to improve the computation efficiency of linear programming problem .

  21. 语言模糊性及交替传译中对模糊语言的应对策略政治语篇中的模糊限制语翻译策略(英文)

    Language Fuzziness and Strategies to Deal with It in Consecutive Interpretation Hedges in Political Texts and Translation ;

  22. 有限制的采购策略

    Strategy of Limited Purchase

  23. 松嫩平原低平易涝地农业持续发展的限制因素及策略

    The Limiting Factors and Countermeasures of Agricultural Sustainable Developement in Low-Flat and Flood - Prone Area of Song-Nen Plain

  24. 而混合式学习类型的多样化限制了这些策略和模式在实践中的应用。

    However , the diversity of blended learning sets a limit on the application of these strategies and designs .

  25. 受学习内容和学习阶段限制明显的策略需进行介绍和反复训练,其收效明显。

    The strategies conditioned by learning contents and stages require presentation and repeated training , and bring about obvious effect .

  26. 由于后代的死亡,这种“自我限制”的策略理论上几乎不会带来基因被不加限制地释放到环境中的威胁。

    The'self-limiting'strategy theoretically poses little threat of genes being released uncontrolled into the environment because of the death of the offspring .

  27. 还重点讨论了攻击响应部分,包括响应的位置、包过滤和速率限制、回退策略。

    Then it focuses on attack response , including egress filtering , packets filtering and rate limit , and the pushback method .

  28. 模糊限制语的策略性运用研究还没有引起足够的重视,对运用模糊限制语的策略进行较为系统的研究才能使模糊限制语的研究更为全面。

    The study of the Hedging Strategies has not aroused enough recognition , which can make the study of the hedges more comprehensive .

  29. 网络辅助策略培养的现代化手段突破了培养时间与空间的限制,成为策略培养中不可或缺的手段。

    The strategies training on net can break the time and space constraints , it becomes an integral part of training ways . 8 .

  30. 然而在对语义推理子范畴的影响因素研究中,结果发现这些推理同语境限制与处理策略有着密切的联系。

    Moreover , studies on the influential factors of semantic inferences show that semantic inferences are not only affected by contextual constraints , but also closely related to processing strategies .