Examples of using To control access in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
This article focuses on using SharePoint groups to control access to a site.
you can also use the tag with the path attribute to control access to a specific folder or file.
The SSP should ensure that there are clearly established policies and practices to control access to all restricted areas.
The trend toward decentralized and autonomous systems threatens our ability to control access to the U.S. financial system,” he said.
and timers, to control access to a P2MP topology.
tag with the path attribute to control access to a specific folder or file.
Folder Guard® is a powerful computer security software that you can use to control access to files, folders,
We may also use Cookies and Other Tracking Technologies to control access to certain content on our websites,
with IEEE 802.1X port security to control access to your network.
Packages are used in Java in-order to prevent naming conflicts, to control access, to make searching/locating and usage of classes, interfaces, enumerations
We also may use Cookies and Other Tracking Technologies to control access to certain content on our Sites,
of a security breach, with IEEE 802.1X port security to control access to your network.
Tes are used primarily to control access in and out of parking facilities, or to control vehicular traffic at manned security entrances.
We also use cookies and other tracking technologies to control access to certain content on our website, to protect the website
with IEEE 802.1X port security to control access to your network.
Passage direction: the free setting of uni-direction or bi-direction to control access, and uni-directional free passage, bi-directional free passage
the type of information collected, user identifiers, passwords or other access codes may also be used to control access to your personal information.
So as to safeguard your network, the switch utilizes IEEE 802.1X port security to control access to your network and reduce the risk of a security breach.
the type of information collected, user identifiers, passwords or other access codes may also be used to control access to your personal information.
configuration element to control access to folders and files within the application, as we saw in the example on Forms authentication.