They settled on applying the same use policy and code of compliance that they use for email.
它们决定应用与电子邮件所使用的相同的使用策略和遵从性代码。
This behavior can now be changed on the fly by changing the policy in the registry, and no code changes or redeployment of code is required.
现在可以通过更改注册中心的策略来动态更改该行为,并且不需要进行任何代码更改或代码重新部署。
Understanding and maintaining the authorization policy will be an order of magnitude more difficult, even if the code is free from defects.
了解和维护授权策略更加困难,即使代码没有任何缺陷。
Optimize development and ensure code quality policy adherence through the integration of automated code quality reviews throughout the development lifecycle.
通过在整个开发周期内,集成自动代码质量评审功能,来最优化开发过程并确保代码质量政策的一致性。
To cache all content except for search results, personalized, and voice mail policy pages, set the following code in cachespec.xml.
要缓存除搜索结果、个性化和声音邮件策略页面外的所有内容,在cachespec . xml中设置下列代码。
Microsoft has released version 1.36 of FxCop, the popular static code analysis and policy enforcement tool.
FxCop是一个广泛使用的静态代码分析器和策略优化工具,最近微软发布了该产品的1.36版本。
The SCA TCs plan to provide practical help, in the form of language bindings, a policy framework, and code patterns.
各个SCA技术委员会计划提供实质性的帮助,通过语言绑定、策略框架、代码模式等等方式。
Framework code can handle the policy, and user code — provided in a closure — can customize it. Listing 13 shows the basic usage pattern.
框架代码能处理策略,而在闭包中提供的用户代码能定制此策略。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
It also makes it possible to retain metadata at source code level in class files, and at runtime controlled by a retention policy.
它还使得在类文件中以源代码级别保留元数据、并在运行时由保持(retention)策略控制成为可能。
Fortunately, OpenLaszlo also USES the same policy-file-based mechanism and, hence, the same server code can work for both scenarios.
幸运的是,OpenLaszlo也使用了相同的基于策略文件的机制,因而,同样的服务器代码适用于两种场景。
To maintain these somewhat-contradictory goals of activating Slice without affecting the application code and, at the same time, allow some control, Slice employs a plug-in policy-based approach.
为了在不影响应用程序代码的情况下,保持激活slice的这些多少有点矛盾的目标,同时又能允许某些控制,Slice采用了一个内置的基于策略的方式。
The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.
通过对恶意代码机理研究和实践,为恶意代码防范技术研究和网络安全策略研究提供理论基础和指导依据。
The publisher policy file specifies assembly redirection and code base settings, and uses the same format as an application configuration file.
发行者策略文件指定程序集重定向和基本代码设置,并使用与应用程序配置文件相同的格式。
Security configuration files contain information about the code group hierarchy and permission sets associated with a policy level.
安全配置文件包含有关与策略级别关联的代码组层次结构和权限集的信息。
The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.
运行时的策略机制使用来自受信任的应用程序域宿主和程序集的证据来确定一段代码在代码组中的成员资格。
The effective permission set that the security policy grants to code is determined by the intersection of the permission sets granted by the machine and user policies.
安全策略向代码授予的有效权限集是由计算机策略和用户策略授予的权限集的交集确定的。
Security policy defines several code groups and associates each group with a set of permissions.
安全策略定义若干代码组并将每个代码组与一个权限集关联。
Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
根据代码要求的权限和安全策略允许的操作,向加载的每个程序集授予权限。
Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.
代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。
PwC stressed that the dress code required by Portico in December 2015 was Portico's policy and had been enforced by a Portico supervisor.
PwC强调,Portico在2015年12月提出的着装要求是Portico的政策,一直被该公司一名主管强制执行。
It especially highlights the test first policy-uninterrupted test propels code exploitation, thus achieves the goal of code simplicity and at the same time quality assurance.
尤其是其中的“测试先行”,以不断的测试推动代码的开发,从而达到既简化代码,又保证质量的目标。
At load time, the code access security system examines all policy levels and the resulting permission grant is the intersection of all allowed permissions in each level.
在载入时间,程序码存取安全系统会检查所有原则层级,产生的使用权限授权是每一个层级中所有允许的使用权限的交集。
The security system uses XML files to store and recreate the code group hierarchy for each policy level.
安全性系统使用XML档来储存和重新建立各个原则层级的程式码群组阶层架构。
Abide by Plan's Code of Conduct and Child Protection Policy, keep the documents assigned to you confidential and should not let out any information without Plan's Permission;
遵循国际计划的《行为守则》和《儿童保护政策》,对校对的文件内容应保密,不可外泄。
Each security policy level has its own hierarchy of code groups that provides infrastructure for establishing and configuring security policy.
每个安全策略级别均有自己的代码组的层次结构,该层次结构为建立和配置安全策略提供基础结构。
The SCATCs plan to provide practical help, in the form of language bindings, a policy framework, and code patterns.
各个 SCA 技术委员会计划提供实质性的帮助,通过语言绑定、策略框架、代码模式等等方式。
Describes when and how you should add a publisher policy file to specify assembly redirection and code base Settings.
说明您何时应该以何种方式新增发行者原则档,以指定组件重新导向和程序码基底设定。
Describes when and how you should add a publisher policy file to specify assembly redirection and code base Settings.
说明您何时应该以何种方式新增发行者原则档,以指定组件重新导向和程序码基底设定。
应用推荐