Earlier this month two Mexican reporters said they were beaten up in custody by Greek coastguards after filming outside the restricted security zone of the Athens port of Piraeus.
本月初,两名墨西哥记者宣称他们在雅典南部港口比雷埃夫斯的限制安全区外拍摄时,被希腊海岸警卫队制止。
The restricted level of rights required by the Out of Office agent does not allow the user to perform any methods that impact security.
离开办公室代理要求的受限制的权限级别不允许用户执行任何会对安全性造成影响的方法。
Within the administrative security domain for a cell, this enables administrative roles to be restricted to specific components, such as a cluster, node, application server, or application.
在单元的管理安全域中,这允许将管理角色限制到特定的组件,例如集群、节点、应用程序服务器或应用程序。
Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.
对特定页面的访问使用J2EE声明性和程序性安全来限制,以禁止对页面的非授权访问。
Neither has it impacted security or restricted the types of applications and languages that can make use of it.
也没有影响安全或限制应用程序和语言的类型。
The connection can also be defined as Restricted, which is only available to the users who have the specified security role.
连接可以定义为Restricted,只有具有指定安全角色的用户可以使用。
Some will be free for use, and some will be restricted for security or commerce, but these are just details that Web developers have already sorted out, for the most part.
有些内容可以自由使用,有些则受安全性或商业限制,但从很大程度上来说,这一切只是Web开发人员已经能够处理的细枝末节。
Although restricted by this, code access security further restricts the application depending on where it came from.
虽然受限于此,但是代码访问安全将根据这个文件的来源重新对其进行约束。
Ship Security Officer: I'm terribly sorry. Bridge is one of the restricted areas on board. Only authorized persons can have access to it.
船舶保安:非常抱歉。驾驶台是船上的一个限制区。经授权方可进入。
Dark Grey shading indicates the security is restricted with the opinion suspended.
深灰色阴影部分指的是未经审核的证券。
Network access management should ensure that terminals pass the security examination. Once terminals 'healthy condition does not meet the security policy, it should be restricted and repaired.
安全的接入管理应该能够确保用户在接入时满足终端安全策略的要求即通过健康体检,并且一旦出现健康状况不满足安全策略时即被限制访问和要求修复。
This "workaround" circumvents security and allows malicious code to wreak havoc with restricted resources.
这种“变通”规避了安全机制,让恶意代码得以对受限资源造成重大破坏。
It can also ensure that complete security context information is passed across asynchronous operations or code points with restricted code access.
宿主还可确保在异步操作或代码访问受限制的码位间传递完整的安全性上下文信息。
Article 3. The maps referred to in these Measures mean ordinary maps, the maps of special subjects and security maps, restricted maps and the non-published maps displayed publicly.
第三条本办法所称地图,是指普通地图、专题地图以及保密地图、内部地图、公开展示的非出版地图。
Article 3. The maps referred to in these Measures mean ordinary maps, the maps of special subjects and security maps, restricted maps and the non-published maps displayed publicly.
第三条本办法所称地图,是指普通地图、专题地图以及保密地图、内部地图、公开展示的非出版地图。
应用推荐