プロの翻訳者、企業、ウェブページから自由に利用できる翻訳レポジトリまで。
access control
kawalan akses
最終更新: 2011-10-23
使用頻度: 1
品質:
imap access control
kolab folder properties
最終更新: 2014-08-20
使用頻度: 1
品質:
datasource access control center
gagal melaksanakan kenyataan oracle
最終更新: 2014-08-20
使用頻度: 1
品質:
unable to add user to access control list:
pengguna %s tidak dapat ditambah ke senarai kawalan akses
最終更新: 2014-08-20
使用頻度: 1
品質:
%s %s -- get file access control lists
%s %s -- dapatkan senarai kawalan capaian
最終更新: 2014-08-15
使用頻度: 1
品質:
{0} cannot be added to an access control list
pengguna %s tidak dapat ditambah ke senarai kawalan akses
最終更新: 2014-08-20
使用頻度: 1
品質:
could not execute the database access control center
gagal melaksanakan kenyataan oracle
最終更新: 2014-08-20
使用頻度: 1
品質:
-d, --default display the default access control list
-d, --default paparkan senarai kawalan capaian lalai
最終更新: 2014-08-15
使用頻度: 1
品質:
error retrieving access control list (acl) from server %1
ralat semasa memperoleh semula senarai kawalan akses (ska) dari pelayan% 1
最終更新: 2011-10-23
使用頻度: 1
品質:
this imap server does not have support for access control lists (acl)
pelayan imap ini tidak ada sokongan untuk senarai kawalan akses (ska)
最終更新: 2011-10-23
使用頻度: 1
品質:
retrieving the access control list on folder %1 failed. the server returned: %2
nyah langgan folder% 1 gagal.
最終更新: 2011-10-23
使用頻度: 1
品質:
deleting the access control list on folder %1 for user %2 failed. the server returned: %3
nyah langgan folder% 1 gagal.
最終更新: 2011-10-23
使用頻度: 1
品質:
access control is a 24/7 electronic security solution providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk-in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons – instant granting or removing access rights • controls and monitors who goes where and whenn providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons �
no query specified. example request: get?q=hello&langpair=en|it
最終更新: 2022-08-03
使用頻度: 1
品質:
参照:
警告:見えない HTML フォーマットが含まれています