Some applications require complex security restrictions.
有些应用程序要求复杂的安全性限制。
Security restrictions are available only as global scope commands.
安全限制仅用于全局作用域命令。
Some security restrictions do not show themselves as a SecurityException.
一些安全性约束不会将自己显示为SecurityException。
Due to security restrictions, only Products can be imported, not arbitrary modules.
由于安全性限制,只有Product可以被导入,而不是什么模块都可以。
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
Once again I had to dummy out some of the functionality in stats.js XUL file because of security restrictions.
由于安全限制,我不得不去掉了 stats.jsXUL文件中的一些功能。
This process is often applied to the complete data set in the sources — that is, without security restrictions.
通常将这个过程应用于数据源中完整的数据集,即没有任何安全限制。
To define security restrictions for operations or the interface as a whole, use the security permission qualifier.
要整体定义操作的安全限制或界面,可是使用安全许可限定符。
Security restrictions are available only as global scope commands. For more information, see your administrator.
安全限制仅用于全局作用域命令。有关更多信息,请向管理员咨询。
Security Restrictions Reflection requires a runtime permission which may not be present when running under a security manager.
使用反射技术要求程序必须在一个没有安全限制的环境中运行。
The next three callbacks have to do with applying security restrictions, and their interactions are often a source of confusion.
接下来的三个回调和应用安全限制相关,它们之间的相互作用往往是混乱的根源。
Defamation and public security restrictions on the press should remain in place to protect from false or legitimately dangerous information.
对新闻界的诽谤和公开安全限制,应适可而止,以防止虚假或合法的危险信息。
Installed packages have the advantage that they don't have security restrictions placed on them, which is necessary for many applications.
安装包具有不受安全限制的优势,这对大多数应用程序是十分必要的。
Figure 1 shows the security restrictions that you could impose on the Retailers dimension of the GO Sales and Marketing cube for managers in the United States.
图1展示了针对美国的经理在GOSalesand Marketing多维数据集上施加的限制。
Each data source can have its own security restrictions, which might need to be addressed in order to allow the data to be accessed and retrieved appropriately.
每个数据源可能具有自己的安全限制,为了对数据进行正确地访问和检索,可能需要处理这个问题。
Thus, for example, all bank accounts have the same security restrictions, but you would prefer that certain users have special permissions on their own accounts.
再如,所有的银行账号都有相同的安全性限制,但是您更希望某些用户对其自己的账号拥有特殊权限。
For programs running in user space, there are common security restrictions implemented in the kernel of almost all modern operating systems (in one fashion or another).
对于运行在用户空间中的程序,具有公共安全性限制,它们在几乎所有现代操作系统的内核中实现(以一种或另一种方式)。
Use of XSLT is more difficult to set up, especially as modern releases of browsers increasingly place security restrictions (see Resources for a link) on the use of XSLT.
XSLT的使用越来越难以设置,尤其是随着浏览器的现代版本在 XSLT 的使用上放置的安全约束越来越多(参见参考资料中的链接)。
The benefit of installing an application is lowered security restrictions so that applications may read and write files, and access user preferences and system information.
安装一个应用程序的好处是较低的安全限制,因此应用程序可以读、写文件,并且获得用户参数选择和系统信息。
This paper designs an algorithm on multi-queue scheduling supporting fairness of queues and security policy for some distributed real-time systems with security restrictions.
本文在采用多队列调度策略的基础上,对一些有安全级别限制的系统,设计一种支持队列公平和安全策略的多队列调度算法。
Scripts also are limited to the capabilities of the scripting language and are limited in their interaction with the client computer and the network because of security restrictions.
脚本也受限于脚本语言的功能和与客户端机器的交互能力,以及网络的限制因为安全限制。
When moving the service to a dev computer everything works just great? Why whould I get the above problems in just one environment? Could this be due to strong security restrictions?
当移动服务开发电脑一切正常就好吗?我怎肯让上面的问题只是一个环境?这可能是由于强大的安全限制吗?。
Nationwide security restrictions on the transport of liquids, for example, have delayed the delivery of chemical and biological reagents to laboratories, especially those coming from abroad.
全国范围液体禁运,已经延缓了实验室接受化学和生物试剂、尤其是来自国外的试剂。
There will be several different security domains, each of which have different access controls and restrictions.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
Restrictions are proposed to ensure that modules and pages cannot interfere with one another's display, causing security issues.
提出了一些限制用于确保模块和页面不会干扰彼此的显示,避免导致安全问题。
PDF files include a variety of security options - from access restrictions to electronic signatures - that help protect sensitive company information.
PD F文件包括多种安全选项——从访问限制到电子签名——帮助保护敏感的公司信息。
Data security, licensing restrictions, or industry regulations restrict data movement.
数据安全性、许可限制或行业规则限制了数据传输。
You learned about restrictions on security plug-ins, and common errors encountered while working with them to help you debug problems when implementing security plug-ins on your own.
通过本文还可以了解安全性插件的一些限制,使用安全性插件时可能遇到的一些常见问题,从而有助于您在实现自己的安全性插件时调试问题。
Refer to the Restrictions section above to ensure that what you are trying to accomplish is not a DB2 restriction on how security plug-ins operate.
请参考限制小节,以确保操作不在db 2限制的安全性插件操作的范围内。
But many complain about the impact that stringent security precautions and tightened visa restrictions for foreigners have had on business.
但很多人也抱怨严格的安保和对外国人签证的限制会给商业带来很大影响。
应用推荐