| 1. | One person ' s " security perimeter " is another ' s " broken network " 一个人的"周边安全" ,是另一种的"断网" |
| 2. | Set up a security perimeter 设置安全警戒线 |
| 3. | Often floating on the internet , have not had a bodyguard , the software can be perfect for you to create the security perimeter 常在网上漂,哪有不中镖,本软件能为你打造天衣无缝的安全防线。 |
| 4. | Interoperating with unmanaged code working with unmanaged code involves going outside the security perimeter for managed code 讨论在microsoft excel中保证数据安全的功能,例如密码保护和数字证书。 |
| 5. | However , data received from the client needs further scrutiny to extend the security perimeter from common design elements to application code 不过,需要对收到的客户数据作进一步的审查,以便将安全边界从常用的设计元素扩展到应用程序代码。 |
| 6. | Because this means going outside the security perimeter for managed code , due caution is required . if your code is security - neutral , both your code and any code that calls it must have unmanaged code permission 如果您的代码是不受安全性影响的,那么您的代码以及调用它的任何代码都必须具有非托管代码权限(指定了 |