Again, that's security policy.
再说一遍,那是安全的策略。
应用程序安全策略。
Creating an LBAC security policy.
创建LBAC安全策略。
选择安全策略。
Figure 2: Creating a security policy.
图2:创建一个安全策略。
Building a security policy for MDM server.
为MDMServer构建安全策略。
America updates its space-security policy.
美国更新了它的太空安全政策。
The security policy is shaped by four things.
安全策略受到四个方面的影响。
What does a good security policy even look like?
好的安全策略是什么样子的呢?
As such, climate policy is also security policy.
就其本身而论,气候政策也是安全策略。
If needed, you can download a Flash security policy.
如果需要,可以下载一个Flash安全策略。
These rules are usually encoded in a security policy.
这些规则通常编码在安全策略中。
A security policy can be used by one or more projects.
一个安全策略能够被一个或者多个项目使用。
A table can be associated with only one security policy.
一个表只能与一个安全策略相关联。
A security and discovery agent to manage security policy.
管理安全策略的“安全及发现代理”。
A security policy is made up of security label components.
一个安全策略由一些安全标签组件组成。
Therefore, Steve creates a security policy for each group.
因此,Steve为每个组创建一个安全策略。
Security Policy is a mandatory field on the project record.
在创建项目时,安全策略是必填选项。
Use these group definitions for defining the security policy.
使用这些组定义来定于安全策略。
To define the WS Security policy set for the client side.
要为客户端定义WSSecurity策略集。
After you've got a security policy, define personae and workflows.
获得安全策略后,就要定义角色和工作流。
Your organization has a security policy that requires this feature.
您的组织有一个安全策略要求有这种特性。
This security policy grants access to every user for every project.
这个安全策略授权每一个人都可以访问项目。
Projects for the third part are then assigned that security policy.
第三方项目会分配那个安全策略。
This limitation is known as the same origin server security policy.
这项限制就是相同初始服务器安全性策略。
Define the scope by "drawing" a boundary around the security policy.
通过在安全策略的周围“划出”边界来定义范围。
The security policy is created and the third-party group is selected.
这个安全策略会被创建,而且第三方小组也会被选择。
How will your organization's security policy affect the GDD tool usage?
您组织的安全政策如何影响GDD工具使用?
Sometimes that may not satisfy the security policy for the application.
有时候,那可能不满足应用的安全性策略。
Both source and target tables are protected by the same security policy.
对于源表及目标表采用相同的安全策略进行保护。
应用推荐