• Figure 5 shows an example of Security Rules.

    5显示了安全规则一个例子

    youdao

  • Security rules are entered in a zero configuration file.

    安全规则zero配置文件输入的。

    youdao

  • The User ID condition can be contained in Security Rules.

    UserID条件可以包含安全规则中。

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • Social Security law and procedure remain a jungle of complex rules.

    社会保障法律程序仍然是充满复杂规定的一团糟

    《柯林斯英汉双解大词典》

  • These rules are usually encoded in a security policy.

    这些规则通常编码安全策略中。

    youdao

  • Those nations that follow the rules will find greater security and opportunity.

    遵守规则国家得到更大安全保障机会

    youdao

  • Use the security Policy Editor to define disclosure rules for the security scenario.

    使用SecurityPolicyEditor安全场景定义公开规则

    youdao

  • The key of IDS is the accuracy of the security mode rules.

    入侵检测系统关键在于安全模式规则准确性

    youdao

  • Whether network security can be achieved by rules?

    网络安全规矩能否成方圆?。

    youdao

  • Whether network security can be achieved by rules?

    网络安全规矩能否成方圆?。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定