-
1 user-level security
"When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros." -
2 user interface privilege level
The integrity level that is stored in the access token of a process and that is used by the UI Privilege Isolation (UIPI) feature to determine if an application or process is permitted to send Windows messages to another application or process.English-Arabic terms dictionary > user interface privilege level
-
3 User Interface Privilege Isolation
A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level.English-Arabic terms dictionary > User Interface Privilege Isolation
-
4 Change Level of Access
Contact context menu item that allows the user to assign an access level to the selected contact(s). -
5 permissions level
"The extent of access a user has to a site. The default permissions levels are Read, Edit, Design, and Full Control." -
6 access level
A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type. -
7 field-level access
"The permission that is assigned to a user or users that allow them to read, update, or create a specific field." -
8 shared control
A Web Parts control that can appear on a Web page and be personalized when the page is in either shared or user-level personalization scope. Note that a shared control can have properties that are both user-scope and shared-scope for personalization purposes. -
9 authenticated access
A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site. -
10 Parent: Child Business Units
A security access level that allows a user access to record types in the user's business unit and all business units subordinate to the user's business unit.الأصل: وحدات عمل تابعةEnglish-Arabic terms dictionary > Parent: Child Business Units
-
11 elevation of privilege
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
12 ar-sa التحكم بالوصول
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
13 access control entry
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
14 ACE
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
15 progressive disclosure
"A technique for hiding the complexity of an interface by presenting the user with the primary or common options or choices at the topmost level, and then revealing more advanced or complex options through another means, such as explicit user action or navigation." -
16 elevation
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
17 DirectComposition
"A Windows API that enables user experiences that are smooth and fluid and allow developers to compose content from multiple rendering libraries to the same top-level window, removing the dependency on a specific rendering or user interface framework to create a general solution that can satisfy a broad range of scenarios. (This API is not for Windows Store app development.)" -
18 JPEG
"A raster graphics file format for displaying high-resolution color graphics on the World Wide Web. JPEG graphics apply a user-specified compression scheme that can significantly reduce the file sizes of photo-realistic color graphics. A higher level of compression results in lower quality, whereas a lower level of compression results in higher quality. JPEG-format files have a.jpg file name extension." -
19 Global
A privilege level that specifies the user has access to objects anywhere within the organization. The application refers to this level as Organization. -
20 Access Levels Management
A UI element that displays a user's contacts and access level entries (ACEs) organized by access level.
- 1
- 2
См. также в других словарях:
User-Level Thread — Als User Thread, User level Thread oder Fiber (Windows) bezeichnet man in der Informatik eine bestimmte Art, Programme bzw. Programmteile verzahnt ablaufen zu lassen. Die Funktionalität ist dabei nicht direkt im Betriebssystemkern implementiert… … Deutsch Wikipedia
user level — The level of security which a user has. This usually is in the form of word(s), usually progressing from: New User, Registered User, Privileged User, SysOp Level. See also security level … Dictionary of telecommunications
User Thread — Als User Thread, User level Thread oder Fiber (Windows) bezeichnet man in der Informatik eine bestimmte Art, Programme bzw. Programmteile verzahnt ablaufen zu lassen. Die Funktionalität ist dabei nicht direkt im Betriebssystemkern implementiert… … Deutsch Wikipedia
User Account Control — (UAC) is a technology and security infrastructure introduced with Microsoft s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator … Wikipedia
User Interface Modeling — is a development technique used by computer application programmers. Today s User Interfaces (UIs) are complex software components, which play an essential role in the usability of an application. The development of UIs requires therefore, not… … Wikipedia
User Account Control — (UAC), zu deutsch Benutzerkontensteuerung, ist eine Technik und Sicherheitsinfrastruktur, die beim Betriebssystem Microsoft Windows Vista eingeführt wurde. Sie soll den Schutz des Systems für den Standardbenutzer erleichtern. Inhaltsverzeichnis 1 … Deutsch Wikipedia
Level design — or game mapping is the creation of levels mdash;locales, stages, or missions mdash;for a video game (such as a console game or computer game). This is commonly done using level design tools, special software usually developed just for the purpose … Wikipedia
User Interface Privilege Isolation — (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat code injection exploits. By leveraging Mandatory Integrity Control, it prevents processes with a lower integrity level (IL) from sending messages to higher IL… … Wikipedia
User Interface Privilege Isolation — (UIPI Isolation des privilèges de l IHM) est une technique de sécurité utilisée par Windows Vista et Windows Server 2008 pour se protéger contre les exploits d injection de code. UIPI évite qu un processus ayant un bas niveau de sécurité… … Wikipédia en Français
User-generated content — UGC redirects here. For other uses, see UGC (disambiguation). User generated content (UGC) covers a range of media content available in a range of modern communications technologies. It entered mainstream usage during 2005 having arisen in web… … Wikipedia
User interface — The user interface, in the industrial design field of human–machine interaction, is the space where interaction between humans and machines occurs. The goal of interaction between a human and a machine at the user interface is effective operation … Wikipedia