- 1. Again, that's security policy.
- 再说一遍,那是安全的策略。
来自互联网
- 2. Application security policy.
- 应用程序安全策略。
来自互联网
- 3. Creating an LBAC security policy.
- 创建LBAC安全策略。
来自互联网
- 4. Choose Security Policy.
- 选择安全策略。
来自互联网
- 5. Figure 2: Creating a security policy.
- 图2:创建一个安全策略。
来自互联网
- 6. America updates its space-security policy.
- 美国更新了它的太空安全政策。
来自互联网
- 7. What does a good security policy even look like?
- 好的安全策略是什么样子的呢?
来自互联网
- 8. As such, climate policy is also security policy.
- 就其本身而论,气候政策也是安全策略。
来自互联网
- 9. These rules are usually encoded in a security policy.
- 这些规则通常编码在安全策略中。
来自互联网
- 10. A security policy can be used by one or more projects.
- 一个安全策略能够被一个或者多个项目使用。
来自互联网
- 11. A table can be associated with only one security policy.
- 一个表只能与一个安全策略相关联。
来自互联网
- 12. A security policy is made up of security label components.
- 一个安全策略由一些安全标签组件组成。
来自互联网
- 13. Security Policy is a mandatory field on the project record.
- 在创建项目时,安全策略是必填选项。
来自互联网
- 14. Use these group definitions for defining the security policy.
- 使用这些组定义来定于安全策略。
来自互联网
- 15. Threat detection rules and security policy enforcement are needed.
- 需要有威胁检测规则并执行安全策略。
来自互联网
- 16. After you've got a security policy, define personae and workflows.
- 获得安全策略后,就要定义角色和工作流。
来自互联网
- 17. Your organization has a security policy that requires this feature.
- 您的组织有一个安全策略要求有这种特性。
来自互联网
- 18. This security policy grants access to every user for every project.
- 这个安全策略授权每一个人都可以访问项目。
来自互联网
- 19. Projects for the third part are then assigned that security policy.
- 第三方项目会分配那个安全策略。
来自互联网
- 20. This limitation is known as the same origin server security policy.
- 这项限制就是相同初始服务器安全性策略。
来自互联网
- 21. Define the scope by "drawing" a boundary around the security policy.
- 通过在安全策略的周围“划出”边界来定义范围。
来自互联网
- 22. The security policy is created and the third-party group is selected.
- 这个安全策略会被创建,而且第三方小组也会被选择。
来自互联网
- 23. How will your organization's security policy affect the GDD tool usage?
- 您组织的安全政策如何影响GDD工具使用?
来自互联网
- 24. Sometimes that may not satisfy the security policy for the application.
- 有时候,那可能不满足应用的安全性策略。
来自互联网
- 25. Both source and target tables are protected by the same security policy.
- 对于源表及目标表采用相同的安全策略进行保护。
来自互联网
- 26. How does your application fit into the overall enterprise security policy?
- 应用程序如何融入到整个企业安全策略中?
来自互联网
- 27. Does the organization have security policy management frameworks in place?
- 组织拥有现成的安全政策管理框架吗?
来自互联网
- 28. There can be a maximum of 16 unique security components in a security policy.
- 一个安全策略中最多可以有16个不同的安全组件。
来自互联网
- 29. When creating a project the security policy is selected from a drop-down list.
- 当您创建一个项目时,安全策略是从下来列表中选择的。
来自互联网
- 30. Always establish a security policy before you perform a vulnerability assessment.
- 在您执行漏洞评估之前,一定要确立一条安全策略。
来自互联网