Examples of using Control list in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
can make use of RFC 4314, IMAP4 Access Control List(ACL), to administrate access to the shared resources.
Access Control List or ACL is according to the Wikipedia definition,“… ACL specifies which users or system processes are granted access to objects,
included in the Commerce Control List which is found in the Supplement 1 to Part 774 of the Export Administration Regulations.
you are encouraged to follow the guidelines for adding QoS markings to traffic at your network boundary as described in the Implementing QoS using Network Access Control List(ACL) section of this article.
are included in the Commerce Control List(CCL) which is found in Supplement 1 to Part 774 of the Export Administration Regulations.
Export Control Classification Number is abbreviated as ECCN which have five character alpha numeric designations used on the Commerce Control List(CCL) to decide on the dual use items for export control purposes.
contained in the Commerce Control List that is found in the Supplement 1 to Part 774 on the Export Administration Regulations.
she was put on Pakistan's Exit Control List(the“List”), a list of people prohibited from traveling abroad.
The court removed his name from the(exit control list), withdrew his arrest warrant
Mukhtaran was put on Pakistan's Exit Control List(ECL), a list of people prohibited from traveling abroad,
Configurations include access control lists, content scanning,
It is possible to add access control lists to.
Use classic access control lists for applications, Internet traffic and their monitoring.
Access control lists(ACL)- These are used to further filter access
change access control lists of files.
Commercial file systems still use access control lists.
Traditional networks use virtual LANs(VLANs) and access control lists(ACLs) for coarse-grained segmentation.
Using Access Control Lists to mitigate threats
access control lists(ACLs), static routing,
Even when access is controlled through access control lists, the problems of maintaining the authorization data is not trivial,