造句

当前位置 /首页/造句 > /列表

用“descriptor”造句大全,descriptor造句

Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.

descriptor造句

An example of the document descriptor they used and an example stub on the server end that matches the descriptor is given in the Resources section.

You'll refer to this name in Part 2 when you write a deployment descriptor for your workflow.

You can see in Listing 3 that some elements in the deployment descriptor correspond to the JMS concepts of acknowledge mode, subscription durability, and message selector.

We define this mapping in the deployment descriptor of the enterprise application.

You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.

In some cases, you can also map a file descriptor to a plain file or another device into memory.

The security descriptor is too short.

The primary advantage of descriptor methods over introspective approaches is the ability to provide more specific messages.

If you specify the name of the resource reference in this page of the wizard, the J2C tools will create the resource reference and update the application descriptor for us automatically.

TAG标签:descriptor 造句 #