您要查找的是不是:
- Went to the security zone, safety first. 跑到安全地带,安全第一。
- You can customize the settings of each security zone. 可以自定义每个安全区域的设置。
- At the noticeboard tells me:"Military security zone. 公告栏上这么写着:“军事安全区。
- It is easy to say that intranets,extranets and Web site applications should exist in security zones but hard to do. 内特网、外特网和Web网站应用程序应存在于安全区域中,说起来容易做起来难。
- Defines the integer values corresponding to security zones used by security policy. 定义与安全策略所使用的安全区域相对应的整数值。
- For more information about security levels and security zones, see Internet Explorer Help. 有关安全等级和安全区域的详细信息,请参阅Internet Explorer“帮助”。
- Explains the security features of ClickOnce deployment and the role of code access security and security zones. 解释ClickOnce部署的安全功能和代码访问安全性的角色以及安全区域。
- Use security zones to set different levels of security for different areas of the Web to help protect your computer. 使用安全区域,可以为不同的Web区域设置不同的安全级,有助于保护计算机。
- It is easy to say that intranets, extranets and Web site applications should exist in security zones but hard to do. 内特网、外特网和Web网站应用程序应存在于安全区域中,说起来容易做起来难。
- Those who are ethnic Tamils can be expected to come under further scrutiny in high security zones. 在高度戒备的地区,少数民族泰米尔人会受到进一步的盘查。
- An application that performs assembly binding redirection outside the Trusted and Intranet security zones requires a security permission. 如果应用程序在受信任的区域和Intranet安全区域外执行程序集绑定重定向,则需要安全权限。
- Security Zones and Content Ratings allow you to control what information the users can view and what is downloaded to their desktops. 使用安全区域和内容分级可以控制用户所能查看的信息以及要下载到用户桌面的内容。
- Information exchanged over extranets would therefore have to cross two security zones in order for a transaction to be complete. 因此为了完成一次交易,通过外特网交流的信息须经过两个安全区域。
- At this boundary,information traveling to and from the corporate center would be crossing three security zones,and would have to meet the access requirements at each border. 在这一个界限内,进出公司中心的信息将穿过3个安全区域,在每道防线上都必须满足接入要求。
- At this boundary, information traveling to and from the corporate center would be crossing three security zones, and would have to meet the access requirements at each border. 在这一个界限内,进出公司中心的信息将穿过3个安全区域,在每道防线上都必须满足接入要求。
- Demonstrates how to set a security zone to populate the Permissions required by the application table. 演示如何设置安全区域以填充应用程序表所要求的权限。
- Applications deployed using ClickOnce technology run with a limited set of permissions based on a security zone. 使用ClickOnce技术部署的应用程序在运行时具有一组有限的权限(基于安全区域)。
- Select a security zone from the Zone your application will be installed from drop-down list. 从“将要从中安装应用程序的区域”下拉列表中选择一个安全区域。
- It helps create a network-wide security zone, blocking the way from computers that have been added, or located outside the protected zone. 它有助于创造一个全网范围内的安全区,阻挠两岸直接从计算机中已加入,或位于外的保护区。
- He might even consider Russia's proposal for a new security zone stretching from Vancouver to Vladivostok, though not at the expense of NATO. 他可能甚至考虑俄罗斯的建议,在从温哥华到符拉边沃斯托克这么长的范围内建立一个新的安全区域,不过这不能比牺牲北大西洋公约组织为代价。