Figure 5 shows an example of Security Rules.
图5显示了安全规则的一个例子。
Enables or disables the security rules.
启用或禁用安全性规则。
Security rules are entered in a zero configuration file.
安全规则是在zero配置文件中输入的。
The User ID condition can be contained in Security Rules.
UserID条件可以包含在安全规则中。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
AIXPert only applies the security rules when you want it to.
只有在您希望应用安全规则时,AIXPert才会这么做。
Adds customizable business rules engine to enforce entity validation, business and security rules.
添加可定制的业务逻辑引擎来执行实体验证、业务和安全规则。
The Out of Office agent USES an agent subsystem and therefore, depends upon the agent security rules.
而Outof Office代理使用代理子系统,且取决于代理安全规则。
You must keep both files in sync in order for the Cube Server to properly enforce your security rules.
您必须保证两个文件同步,以便CubeServer正确实施安全规则。
We probably broke federal, state and Department of Homeland Security rules but the picture was worth it.
我们可能打破联邦,州和国土安全部的规则,但图片是值得的。
The access control algorithm is used to conduct XML document protection according to the security rules.
访问控制算法根据安全规则对XML文档实施保护。
This class indicates which set of security rules the common language runtime should enforce for an assembly.
此类指示公共语言运行时应该对程序集强制的一组安全规则。
These tools are used to analyze code for conformance to coding conventions such as naming or security rules.
这些工具是用于分析程序码是否符合编码惯例,例如命名或安全性规则。
The example will deal with security, which means you'll apply security rules to the REST resources by securing URLs.
这个示例处理安全性问题,这意味着您将通过保护URL把安全规则应用到REST资源。
This enumeration indicates which set of security rules the common language runtime should enforce for an assembly.
此枚举指示公共语言运行时应该对程序集强制的一组安全规则。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
Results optimization system is aim to reduce the false positive by making security rules for parameters in dangerous functions.
结果优化系统主要是利用危险函数的参数特征,针对参数制定安全规则,以降低误报率。
If you decide to edit the config file, you may be surprised to see that the security rules in it aren't applied, even after a reboot.
如果您编辑配置文件,可能会吃惊地发现即使在重新引导之后其中的安全规则也没有生效。
Based on the "Security Rules for Coal Mine", the ventilation resistance and main ventilator behavior in Xing-long Mine is measured.
前言:根据《煤矿安全规程》规定,对兴隆煤矿进行了通风阻力测定和主通风机装置性能测试。
For expected safety level, setting basal security rules to verify the correctness of message sent from client and to prevent attacks.
为达到预期的安全级别,设置了基本的安全规则来验证从客户端发出的消息的正确性,并防止攻击。
Now, you may think (as I did) that if you apply the SOX COBIT rules, your system's locked down, with all the high-level security rules in place.
您可能会认为,如果应用了SOXCOBIT规则,系统就会得到保护,所有高级安全规则都就位了,我以前也这么想。
He tells them the stiff penalties for any violation of the base security rules, as well as for the use of illegaldrugs, fighting, misuse of firearms and so on.
违反基地规则将受到严厉的惩罚。至于打架、吸毒、违章使用武器之类的事情我就不想多说了 你们都清楚的。
The security officer, who establishes the standards and security rules the applications and the infrastructure must comply with, and perform the appropriate audits.
安全官员,他创建程序和基础必须遵从的标准与安全规则,并执行适当的审计运营。
L understand chemicals procurement, transportation, storage and use of security rules, in the process of familiar dangerous chemicals MSDS concerned and safety issues.
l了解化学品采购、运输、储存、使用过程中的安全规定,熟悉常见危险化学品的MSDS及安全要点。
"It is considered a grave breach of security rules," a police spokesman said, adding that a prison guard or a police officer should have been on the tower at all times.
“我们认为这严重违反了安全条例,”警方发言人说,并指出任何时候了望塔上都应该有一名监狱警卫或是警官。
This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.
要实现这个目标,需要获得个人账户的对象,再加上安全规则及审计方面的要求。
This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.
要实现这个目标,需要获得个人账户的对象,再加上安全规则及审计方面的要求。
应用推荐