| 1. | Operating system security conspectus 操作系统安全三 |
| 2. | Operating system security based policies for computer virus prevention 基于操作系统安全的计算机病毒防御策略 |
| 3. | Some meta - schedulers rely on the underlying operating system security 有些元调度器要依赖于底层的操作系统的安全性。 |
| 4. | Most of the default operating system security settings are not configured to minimize security loopholes 大部分操作系统的默认安全设置并未配置为最小化安全漏洞。 |
| 5. | Developing the linux - based secure operating system is mainly to enhance the linux operating system security 基于linux开发安全操作系统,主要是对linux的安全性进行增强。 |
| 6. | Grants the asp . net application permissions to access any resource that is subject to operating system security 授予asp . net应用程序访问任何资源的权限(受操作系统安全性的限制) 。 |
| 7. | Data warehouse tool : the db2 data warehouse center security structure is separate from the database and operating system security 数据仓库工具: db2 data warehouse center安全性结构是与数据库和操作系统的安全性相分离的。 |
| 8. | Namespace , operating system security requirements such as access control lists acls must be satisfied for access to be allowed System . io命名空间中使用类时,要使访问被允许,则必须满足诸如访问控制列表( acl )等操作系统安全性要求。 |
| 9. | As a core component in embedded system , operating system security is the fundament of all the applications based on it and the whole system 操作系统作为嵌入式系统的核心,它的安全是构筑在其上的应用以及整个系统安全性的根本保障。 |
| 10. | In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在对blp模型进行分析的基础上,提出了以blp模型为基础的完整性和特权角色扩展的unix操作系统安全模型。 |