Policy cannot be changed without changing software and is not visible without the source code.
在没有改变软件的情况下不能改变策略,并且没有源代码时也策略也不可见。
This section takes you deep into the policy creation code.
这一节深入探讨策略创建代码。
Code signing is the next essential element in J2ME's application security policy.
代码签名是J2ME应用程序安全性策略中下一个重要元素。
Code 3: File placement policy in IBM sonas.
代码3:ibmSONAS中的文件放置策略。
Code 5: File deletion policy in IBM sonas.
代码5:ibmSONAS中的文件删除策略。
Code 4: File migration policy in IBM sonas.
代码4:ibmSONAS中的文件迁移策略。
See the full text as sign-policy-client.xml in the example code.
在示例代码中可以查看sign - policy - client . xml的完整文本。
The company is changing it's policy on the dress code.
公司正在改变它对衣着规定的政策。
For more information about evidence, code groups, and permission sets, see Security Policy Model.
有关证据、代码组和权限集的更多信息,请参见安全策略模型。
Gentle use policy license code on multiple computers.
柔和的使用政策,在多台计算机上的许可证代码。
Absent this, your code will be granted whatever permissions policy chooses to give it.
如果没有这个设定,您的程序码将会被授与原则选择授与的任何使用权限。
If there are no matches, the policy statement of the parent first-match code group applies.
如果没有相符的项目,则父代的第一个相符程序码群组原则陈述式会套用。
Policy levels and code groups are the structure of the policy hierarchy.
原则层级和程序码群组是原则阶层架构的结构。
You can view, add, remove, and change code groups for a security policy.
您可以检视、加入、移除和变更安全性原则的程序码群组。
A security policy level comprises a hierarchy of code groups.
策略级别由代码组层次结构组成。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
应用推荐