Figure 5 shows an example of Security Rules.
图5显示了安全规则的一个例子。
Security rules are entered in a zero configuration file.
安全规则是在zero配置文件中输入的。
The User ID condition can be contained in Security Rules.
UserID条件可以包含在安全规则中。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
Social Security law and procedure remain a jungle of complex rules.
社会保障法律和程序仍然是充满复杂规定的一团糟。
These rules are usually encoded in a security policy.
这些规则通常编码在安全策略中。
Those nations that follow the rules will find greater security and opportunity.
遵守规则的国家将得到更大的安全保障和机会。
Use the security Policy Editor to define disclosure rules for the security scenario.
使用SecurityPolicyEditor为安全场景定义公开规则。
The key of IDS is the accuracy of the security mode rules.
入侵检测系统的关键在于其安全模式规则的准确性。
Whether network security can be achieved by rules?
网络安全规矩能否成方圆?。
Whether network security can be achieved by rules?
网络安全规矩能否成方圆?。
应用推荐