The runtime enforces code access security.
运行时强制实施代码访问安全。
Code access security is used throughout the.
代码访问安全通过。
Code access security is used throughout the.
对于代码访问安全这里有两点需要注意。
Code access security is a very powerful feature.
代码访问安全是一个十分强大的特性。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
This is an example of the use of access security.
这是存取安全使用的范例。
There are two significant points about code access security.
代码访问安全通过。
Code access Security to limit access to resources on a machine.
代码访问安全性来限制对计算机资源的访问。
This further demonstrates the real flexibility of code access security.
这个例子演示了代码访问安全的灵活性。
When code access security is disabled, all code access demands succeed.
当禁用代码访问安全性时,所有代码访问要求都会成功。
Allows control of code access security permissions for service controllers.
允许声明性的服务控制器权限检查。
I'll also show an example that USES partially trusted code and code access security.
并且同时举出一个部分使用可信任代码以及代码访问安全这两个特性的实例。
This has not always been an easy job, especially when data and access security was at stake.
这不是一件简单的事情,尤其是数据和访问安全处于危险境地时。
Code access security helps limit the access that code has to protected resources and operations.
代码访问安全性会帮助限制代码对受保护的资源和操作的访问。
Configures the code access security permission set that is used to run a particular application.
配置用于运行特定应用程序的代码访问安全权限集。
OBJECTIVE To explore the full access security management of disposable sterile medical articles.
目的探讨对一次性无菌医疗用品的全程安全管理方法。
Has no access security issues, because command line applications generally run without a security manager?
不存在访问安全性问题,因为命令行应用程序运行的时候通常不带安全管理器。
He has a security clearance that allows him access to classified information.
他有安全许可,这准许他接触机密。
There are also many security threats from external access.
还存在许多来自外部访问的安全威胁。
Users attempting to access an object must have its security label granted to them.
试图访问一个对象的用户必须被授予此对象的安全标签。
One safeguard that can be placed on any security model is graduated data access.
可应用于任何安全模型的一种防护措施是分级数据访问。
A security group lets you define how other machines can access an instance.
安全组允许您定义其他机器访问一个实例的方式。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
Writing the security code that defines who can access and use the data.
编写安全代码,它将定义有权访问并使用数据的人员。
What security access rights are required?
需要什么样的安全访问权?
This same security requirement applies to REST access to a data grid.
这个相同的安全需求适用于对数据网格的REST访问。
The security mechanism is crucial in identifying the access mechanism for the service.
安全机制在标识服务的访问机制过程中至关重要。
Create a security realm to secure an application from unauthorized party access.
创建安全域,以防止未经授权的用户访问应用程序。
Now you must set up security access to the UI.
现在必须设置到UI的安全性访问。
应用推荐