单词 | security rules | ||||||||||||||
释义 | security rules
更多释义 收起释义 例句释义: 安全规则,安全性规则,设定安全规则 1. If you decide to edit the config file, you may be surprised to see that the security rules in it aren't applied, even after a reboot. 如果您编辑配置文件,可能会吃惊地发现即使在重新引导之后其中的安全规则也没有生效。 www.ibm.com 2. The name of the system mutex whose access control security rules are to be retrieved. 要检索其访问控制安全性规则的系统mutex的名称。 msdn2.microsoft.com 3. This enumeration indicates which set of security rules the common language runtime should enforce for an assembly. 此枚举指示公共语言运行时应该对程序集强制的一组安全规则。 technet.microsoft.com 4. Class with the specified sections of the access control security rules from the system semaphore with the specified name . 使用来自具有指定名称的系统信号量的访问控制安全性规则的指定部分来初始化。 www.bing.com 5. Class with the specified sections of the access control security rules from the system mutex with the specified name. 使用来自具有指定名称的系统mutex的访问控制安全性规则的指定部分初始化。 msdn2.microsoft.com 6. The Out of Office agent uses an agent subsystem and therefore, depends upon the agent security rules. 而OutofOffice代理使用代理子系统,且取决于代理安全规则。 www.ibm.com 7. Gets a value that indicates which set of security rules the common language runtime (CLR) enforces for this assembly. 获取一个值,该值指示公共语言运行时(CLR)对此程序集强制执行的安全规则集。 207.46.16.251 8. The example will deal with security, which means you'll apply security rules to the REST resources by securing URLs. 这个示例处理安全性问题,这意味着您将通过保护URL把安全规则应用到REST资源。 www.ibm.com 9. Results optimization system is aim to reduce the false positive by making security rules for parameters in dangerous functions. 结果优化系统主要是利用危险函数的参数特征,针对参数制定安全规则,以降低误报率。 www.boshuo.net 10. As I showed in the previous section, basic security rules enforcement is a natural use for aspects. 正如上一节所述,基本安全性规则强制执行是方面的自然使用。 www-128.ibm.com 1. Adds customizable business rules engine to enforce entity validation, business and security rules. 添加可定制的业务逻辑引擎来执行实体验证、业务和安全规则 www.infoq.com 2. In February China set up its own mechanism for scrutinising foreign bids under national security rules. 今年二月,中国建立起受国家审查制度监管的国外竞标审查机制。 www.bing.com 3. It is important to conform to the security rules of medical and electrical equipment for guaranteeing medical quality and personal safety. 遵守医疗电气安全规范,是医疗质量及人身安全的重要保障。 www.chemyq.com 4. The User ID condition can be contained in Security Rules. UserID条件可以包含在安全规则中。 www.ibm.com 5. Rules for access control are configured as Security Rules. 访问控制规则被配置为安全规则。 www.ibm.com 6. If all these potions look like they're going to breach security rules, you should pick up samples from beauty department stores. 如果上面说的那些产品外表违反了安全规定,那你就从美容用品店选购一些小样。 www.ftchinese.com 7. The access control algorithm is used to conduct XML document protection according to the security rules. 访问控制算法根据安全规则对XML文档实施保护。 www.juyy.net 8. Code analysis tools are used to analyze code for conformance to coding conventions such as naming or security rules. 代码分析工具用于分析代码是否符合编码约定,如命名规则或安全规则。 msdn2.microsoft.com 9. These tools are used to analyze code for conformance to coding conventions such as naming or security rules. 这些工具是用于分析程式码是否符合编码惯例,例如命名或安全性规则。 msdn.microsoft.com 10. However, things such as configuring a database and security rules are sometimes required. 但是配置数据库和安全规则等有时还是需要的。 www.ibm.com 1. In RFIDIC, the security rules are applied in both modes. 在RFIDIC中,安全规则应用于这两种模式。 www.ibm.com 2. Figure 5 shows an example of Security Rules. 图5显示了安全规则的一个例子。 www.ibm.com 3. Documents provided by customers, including details security rules, specifications and product specifications 客户提供的安全细则,规范,产品规格等文件 wenku.baidu.com 4. the term "legislation" includes any social security rules as well as laws and regulations; “立法”一词包括任何社会保障规则、法律和条例; www.lawyee.com 5. Decision on Abolishing Some Labor and Social Security Rules and Regulations 劳动和社会保障部关于废止部分劳动和社会保障规章的决定11-09-2007 www.putclub.com 6. Make sure the security rules are followed by the workers 确保工人遵守安全条例 www.baidajob.com 7. Detailed Security Rules and Manual for Workers 工厂的保安细则及手册 wenku.baidu.com 8. Run code review to verify no security rules are violated 运行代码审查来验证没有违反任何安全性原则 www.ibm.com 9. Security Rules Mining from IDS Based on Rough Set 基于粗集方法入侵检测系统中的安全规则的挖掘 www.wanfangdata.com.cn |
||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。