Significantly enhances source code security.
极大地增强源代码的安全性。
Links to topics that cover the basic aspects of code security.
涵盖程序码安全性基本层面的主题连结。
We'll discuss domain-based mobile code security in more detail in a later section.
在后面的一节中,我们将更详细地讨论基于域的移动代码安全性。
How to use the two-dimensional code technology to control the two-dimensional code security?
不用自主的二维码技术怎么把控二维码的安全?
This might put unnecessary pressure on team members and might jeopardize code security and stability.
这可能会给小组成员带来不必要的压力,并且可能危害代码的安全和稳定性。
He punched in the security code.
他把密码输入电脑。
Code signing is the next essential element in J2ME's application security policy.
代码签名是J2ME应用程序安全性策略中下一个重要元素。
Either way, you must actually activate the security handling in your client code.
不管哪种方法,实际上您必须在您的客户端代码中激活安全性处理。
Writing the security code that defines who can access and use the data.
编写安全代码,它将定义有权访问并使用数据的人员。
And, of course, remember to lock your phone with a security code or pattern.
当然记得使用安全代码或者安全模式锁定你的手机。
If every code change is examined by multiple developers, this will usually aid security.
如果每次代码更改都由许多开发人员进行检查,这通常有助于安全性。
Usability: How easy is it to configure the security code?
可用性:配置安全性代码有多容易?
The above code takes care of the security plug-in.
以上代码由安全性插件负责。
The representative of register.com then sent the imposter a security code that he had to provide.
的人员随后请冒名顶替者提供所需的安全码。
No problem. I'm assigning Doris a Level Three security code.
没问题,我给多丽丝安排一个3级安全代码。
This web.xml file is shown in Listing 4. The security code is highlighted.
该web . xml文件显示在清单4中。其中突出显示了安全代码。
As a best practice, code your applications with security in mind.
作为一项最佳实践,在编写应用程序时应该保持安全意识。
Finally, no real security implication. It is all about readability of your code.
最后,没有真正安全的启示。这是关于代码的可读性。
This further demonstrates the real flexibility of code access security.
这个例子演示了代码访问安全的灵活性。
Code access security is a very powerful feature.
代码访问安全是一个十分强大的特性。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
Code access security is used throughout the.
代码访问安全通过。
I'll also show an example that USES partially trusted code and code access security.
并且同时举出一个部分使用可信任代码以及代码访问安全这两个特性的实例。
The security deflector shield will be deactivated when we have confirmation of your code transmission.
当我们确认你们的密码之后,防护罩将会被消除。
For more information about evidence, code groups, and permission sets, see Security Policy Model.
有关证据、代码组和权限集的更多信息,请参见安全策略模型。
Long by two-dimensional code attention to the Security Zhang home!
长按二维码关注“安全张之家”!
In this way, malicious code can achieve higher security access than it should be allowed.
这样,恶意代码获得的安全访问权限可以比它被允许的要高。
The code that is provided with this example models these five security versions.
在该示例中提供的代码模拟了这五个安全版本。
In any case, any code that asserts must take responsibility for security.
在任何情况下,任何执行断言的代码都必须对安全性负责。
Code access security helps limit the access that code has to protected resources and operations.
代码访问安全性会帮助限制代码对受保护的资源和操作的访问。
应用推荐