Van professionele vertalers, bedrijven, webpagina's en gratis beschikbare vertaalbronnen.
access control
kawalan akses
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
imap access control
kolab folder properties
Laatste Update: 2014-08-20
Gebruiksfrequentie: 1
Kwaliteit:
datasource access control center
gagal melaksanakan kenyataan oracle
Laatste Update: 2014-08-20
Gebruiksfrequentie: 1
Kwaliteit:
unable to add user to access control list:
pengguna %s tidak dapat ditambah ke senarai kawalan akses
Laatste Update: 2014-08-20
Gebruiksfrequentie: 1
Kwaliteit:
%s %s -- get file access control lists
%s %s -- dapatkan senarai kawalan capaian
Laatste Update: 2014-08-15
Gebruiksfrequentie: 1
Kwaliteit:
could not execute the database access control center
gagal melaksanakan kenyataan oracle
Laatste Update: 2014-08-20
Gebruiksfrequentie: 1
Kwaliteit:
-d, --default display the default access control list
-d, --default paparkan senarai kawalan capaian lalai
Laatste Update: 2014-08-15
Gebruiksfrequentie: 1
Kwaliteit:
error retrieving access control list (acl) from server %1
ralat semasa memperoleh semula senarai kawalan akses (ska) dari pelayan% 1
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
this imap server does not have support for access control lists (acl)
pelayan imap ini tidak ada sokongan untuk senarai kawalan akses (ska)
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
retrieving the access control list on folder %1 failed. the server returned: %2
nyah langgan folder% 1 gagal.
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
deleting the access control list on folder %1 for user %2 failed. the server returned: %3
nyah langgan folder% 1 gagal.
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
access control is a 24/7 electronic security solution providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk-in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons – instant granting or removing access rights • controls and monitors who goes where and whenn providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons �
no query specified. example request: get?q=hello&langpair=en|it
Laatste Update: 2022-08-03
Gebruiksfrequentie: 1
Kwaliteit:
Referentie:
Waarschuwing: Bevat onzichtbare HTML-opmaak