您要查找的是不是:
- declarative security strategy 申明性安全策略
- The National Security Strategy of the US. 美国国家安全报告。
- Specifies the base attribute class for declarative security from which. 派生自的声明安全性指定基属性类。
- The declarative security is represented in the metadata by the unnamed permission sets, grouped by the security action. 声明性安全在元数据中由未命名的许可权限集表示,通过安全操作进行分组。
- This section outlines the rules used to evaluate declarative security when applied to multiple levels of the same class. 本节概述当声明式安全应用于同一个类的多个级别时用于计算声明式安全的规则。
- When you apply declarative security to classes, it does not propagate to any nested classes or methods of nested classes. 当将声明式安全应用于类时,它不会传播到任何嵌套类或嵌套类的方法。
- Declarative security data in metadata is created from the permission corresponding to the attribute that this method returns. 元数据中的声明性安全数据从对应于此方法返回的属性的权限创建。
- Declarative security data in metadata is created from the permission that this method returns that corresponds to this attribute. 元数据形式的声明安全数据从此方法返回的、对应于此属性的权限创建。
- In order to use declarative security calls, you must initialize the state data of the permission object so that it represents the particular form of permission you need. 为了使用声明式安全调用,您必须初始化权限对象的状态数据,使之表示您需要的特定形式的权限。
- This determines that China must continue to adhere to the defensiveness in substance in her security strategy. 当然,在新的形势下积极防御战略方针的内涵和外延也必须有新的发展。
- For this reason, your custom code access permission cannot be requested or used with link demands or inheritance demands unless you provide support for declarative security. 因此,除非您提供对声明式安全性的支持,否则,将无法请求您的自定义代码访问权限,也不能将该权限与链接要求或继承要求一起使用。
- The system structure of the mega-capacity SIM card has been introduced,and the security strategy is also presented. 从系统架构和安全策略两个方面介绍了大容量SIM卡的设计。
- Declarative security permissions in code compiled using the MSIL Assembler (Ilasm. Exe) and language compilers in the.NET Framework version 2.0 Are stored in the new format. 在.;NET Framework 2
- We present corresponding security strategy and mechanism for emerging attacks against IDS and threats to the system related to mobile agent. 同时针对目前入侵检测系统成为被攻击目标的现状和代理技术给系统带来的安全问题,又提出了相应的安全策略和安全机制。
- When considering a security strategy, it is important to note that there is always a tradeoff between security and usability of a computer system. 当考虑安全策略时,重要的是要注意计算机系统的安全性与可用性之间总是会有一个折衷。
- The ASEAN's regional identify before the mind?1970s pointed to the west capitalist camp, and its security strategy is military bloc strategy. 1970年代中期以前东盟的地区认同是指向西方资本主义阵营,安全战略是军事集团战略。
- The architecture provides safety services of different levels for softswitch by adopting manageable security strategy and different secu... 通过可管理的安全策略,使用不同的安全机制,为软交换提供不同层次的安全服务。
- Declarative security permissions in code compiled using the MSIL Assembler (Ilasm. Exe) and language compilers in the.NET Framework versions 1.0 And 1.1 Are stored in the old format. 在.;NET Framework 1
- From the view of international strategy and national security strategy, the geography factors act as the certain geography strategy relations. 从国际战略和国家安全战略的角度观察,地缘因素表现为一定的地缘战略关系。
- The type '{0}' cannot be serialized because the {1}({2}) method is decorated with declarative security permission attributes. Consider using imperative asserts or demands in the method. 类型“{0}”无法序列化,因为{1}({2})方法是用声明性安全权限属性修饰的。请考虑在方法中使用命令性断言或请求。