• Figure 5 shows an example of Security Rules.

    5显示了安全规则一个例子

    youdao

  • Enables or disables the security rules.

    启用禁用安全性规则

    youdao

  • Security rules are entered in a zero configuration file.

    安全规则zero配置文件输入的。

    youdao

  • The User ID condition can be contained in Security Rules.

    UserID条件可以包含安全规则中。

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • AIXPert only applies the security rules when you want it to.

    只有希望应用安全规则AIXPert才会这么做

    youdao

  • Adds customizable business rules engine to enforce entity validation, business and security rules.

    添加可定制业务逻辑引擎执行实体验证、业务安全规则

    youdao

  • The Out of Office agent USES an agent subsystem and therefore, depends upon the agent security rules.

    Outof Office代理使用代理子系统取决于代理安全规则。

    youdao

  • You must keep both files in sync in order for the Cube Server to properly enforce your security rules.

    必须保证两个文件同步以便CubeServer正确实施安全规则

    youdao

  • We probably broke federal, state and Department of Homeland Security rules but the picture was worth it.

    我们可能打破联邦国土安全部的规则图片值得的。

    youdao

  • The access control algorithm is used to conduct XML document protection according to the security rules.

    访问控制算法根据安全规则XML文档实施保护

    youdao

  • This class indicates which set of security rules the common language runtime should enforce for an assembly.

    此类指示公共语言运行时应该程序强制安全规则

    youdao

  • These tools are used to analyze code for conformance to coding conventions such as naming or security rules.

    这些工具用于分析程序码是否符合编码惯例例如命名安全性规则。

    youdao

  • The example will deal with security, which means you'll apply security rules to the REST resources by securing URLs.

    这个示例处理安全性问题,意味着通过保护URL把安全规则应用REST资源

    youdao

  • This enumeration indicates which set of security rules the common language runtime should enforce for an assembly.

    枚举指示公共语言运行时应该程序强制安全规则

    youdao

  • Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.

    提出信息系统安全评估准则标准理论结构上还成熟,而且可操作性

    youdao

  • Results optimization system is aim to reduce the false positive by making security rules for parameters in dangerous functions.

    结果优化系统主要利用危险函数的参数特征,针对参数制定安全规则,以降低报率

    youdao

  • If you decide to edit the config file, you may be surprised to see that the security rules in it aren't applied, even after a reboot.

    如果编辑配置文件可能吃惊发现即使在重新引导之后其中安全规则没有生效。

    youdao

  • Based on the "Security Rules for Coal Mine", the ventilation resistance and main ventilator behavior in Xing-long Mine is measured.

    前言:根据煤矿安全规程》规定,兴隆煤矿进行通风阻力测定通风机装置性能测试。

    youdao

  • For expected safety level, setting basal security rules to verify the correctness of message sent from client and to prevent attacks.

    达到预期安全级别设置了基本安全规则验证客户端发出消息正确性防止攻击

    youdao

  • Now, you may think (as I did) that if you apply the SOX COBIT rules, your system's locked down, with all the high-level security rules in place.

    可能会认为如果应用SOXCOBIT规则系统会得到保护,所有高级安全规则都就位了,以前也这么想。

    youdao

  • He tells them the stiff penalties for any violation of the base security rules, as well as for the use of illegaldrugs, fighting, misuse of firearms and so on.

    违反基地规则将受到严厉惩罚至于打架吸毒、违章使用武器之类的事情我就不想多了 你们都清楚的。

    youdao

  • The security officer, who establishes the standards and security rules the applications and the infrastructure must comply with, and perform the appropriate audits.

    安全官员创建程序基础必须遵从标准安全规则执行适当审计运营

    youdao

  • L understand chemicals procurement, transportation, storage and use of security rules, in the process of familiar dangerous chemicals MSDS concerned and safety issues.

    l了解化学品采购运输储存使用过程中的安全规定熟悉常见危险化学品MSDS安全要点

    youdao

  • "It is considered a grave breach of security rules," a police spokesman said, adding that a prison guard or a police officer should have been on the tower at all times.

    我们认为这严重违反了安全条例,”警方发言人,并指出任何时候望塔应该有一监狱警卫或是警官

    youdao

  • This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.

    实现这个目标需要获得个人账户对象再加上安全规则审计方面要求

    youdao

  • This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.

    实现这个目标需要获得个人账户对象再加上安全规则审计方面要求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定