• Security considerations for the two service applications.

    对于两个服务应用程序安全考虑

    youdao

  • To understand the Expect source, it's easiest for the moment to neglect security considerations.

    了解expect源代码目前简便的做法是忽略安全性考虑事项。

    youdao

  • The article concludes with security considerations for the agent and job manager topologies.

    本文最后讨论代理拓扑作业管理器拓扑的安全注意事项。

    youdao

  • For more information about security boundaries as they apply to assemblies, see Assembly security Considerations.

    有关应用于程序安全边界更多信息请参见程序安全注意事项。

    youdao

  • For more information about security boundaries as they apply to assemblies, see Assembly security Considerations.

    有关应用于程序安全边界更多信息请参见程序安全注意事项。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定