英語 での The security policy の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Change the security policy.
Tokyu Resort may revise the content of the security policy.
The security policy may restrict the user's ability to use this option.
Others in your organization will understand what the security policy is.
The security policy may restrict the user's ability to use the-C option.
人々も翻訳します
(5) representatives of the user groups affected by the security policy.
The security policy serves as a requirements document against which technical solutions can be judged.
In addition,CaptivePortal policy will be inspected prior to the security policy.
The security policy must be explicit, well-defined and enforced by the computer system.
This is due to restricting the act of closing the window by the security policy of the Web browser.
Maybe the security policy you programmed is conflicting with an existing denypolicy you don't know about.
In the picture below you can see an javascript checker alert that I received whentried to type a password not matching the security policy.
When sudo executes a command, the security policy specifies the execution environment for the command.
It goes without saying that the security policy of each state lies basically in its capacity for self-management and crisis management.
He also is a Regular Member of RJIF's Japan-U.S. Military Statesmen Forum andcontinues to engage with the security policy communities in both the U.S. and Japan.
It goes without saying that the security policy of each state lies basically in its capacity for self-management and crisis management.
This committee includes a mixture of our company executives tasked with supporting the ISMS framework andperiodically reviewing the security policy to ensure continuous, systematic review and improvement.
The security policy should be WPA2-PSK, and the interface should be the multicast VLAN created in Step 1.
This committee includes a mixture of our company executives tasked with supporting the ISMS framework andperiodically reviewing the security policy to ensure continuous, systematic review and improvement.
All provisions of the security policy and work with customers are based on the existing legal norms and acts of the Russian Federation.
With respect to the collected information, the Company will adhere to the security policy as stipulated in the following Article and strictly manage them.
Before getting connected to the Internet or any other public network,you should obtain the security policy of the site that you intend to use as your access provider, and read it.
We shall create the Security Policy to prevent loss, destruction, alteration and/or leakage of personal information in the possession of the UT Group and implement information security measures to prevent illegal access, computer virus, etc.
READ. ME Before getting connected to the Internet or any other public network,you should obtain the security policy of the site that you intend to use as your access provider, and read it.
Concretely, it reports concerning the security policy in the university, the TCP connection is verified effectiveness, and a practicality of anonymous method verification, etc.