| 1. | How is data protected from unauthorized access 如何保护数据不受未授权的访问? |
| 2. | Securing connections used by data mining queries 保护数据挖掘查询使用的连接 |
| 3. | Includes information about securing data and log files 介绍如何保护数据和日志文件。 |
| 4. | To protect the data , you must protect the worksheets 若要保护数据,您必须保护工作表。 |
| 5. | Provides methods for protecting and unprotecting data 提供保护数据和取消数据保护的方法。 |
| 6. | Data integrity : to help protect data from being altered 数据完整性:帮助保护数据不更改。 |
| 7. | Transact - sql syntax for inserting named marks into a transaction log 保护数据和日志文件的安全 |
| 8. | But , they seem to mean it 所以,安全访问是保护数据的基本要求。 |
| 9. | A backup of each read - only file 保护数据和日志文件的安全 |
| 10. | Encryption has been used for thousands of years to secure data 数千年来,人们长期使用加密来保护数据。 |