• Policy cannot be changed without changing software and is not visible without the source code.

    没有改变软件的情况下不能改变策略并且没有源代码时也策略可见

    youdao

  • Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.

    权限请求通过安全策略宿主环境以及代码源权限授予进行严格控制

    youdao

  • Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.

    权限请求通过安全策略宿主环境以及代码源权限授予进行严格控制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定