Policy cannot be changed without changing software and is not visible without the source code.
在没有改变软件的情况下不能改变策略,并且没有源代码时也策略也不可见。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
应用推荐