restricted security 中文意思是什麼

restricted security 解釋
限制公開發行的證券
  • restricted : 被限制的
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Patrol, security and surveillance of car park facilities and restricted areas

    查處超速駕車輛超重及闖紅燈等違章行為
  2. By investigating, we got three main points : s ocial endowment security system is in accordance with the national economy scheme. the system is restricted by many factors and the economy is the most important thing. the security level must be fit with the economy level

    通過以上考察,發現:養老保障制度是與國家的基本經濟制度相一致的,隨著市場經濟的發展和生產社會化程度的逐步提高,以社會保障為基本特徵的現代養老保障制度是必然選擇。
  3. The sites for setting up security warning markers shall be determined by the unit in charge of the military restricted zone and the local people ' s government at or above the county level

    安全警戒標志的設置地點由軍事禁區管理單位和當地縣級以上地方人民政府確定。
  4. " restricted articles " must never be carried in the cabin of an aircraft or taken beyond the security screening point

    所有違禁物品嚴禁攜帶進入飛機艙或通過保安檢查站。
  5. Screening of hold baggage is one of the important security control measures in ensuring that no restricted articles that are used for unlawful interference are carried on board, " mr lam said

    檢查寄艙行李,是確保沒有乘客攜帶違禁物品上飛機作非法干擾的一項重要保安控制措施。
  6. Article 33 in cases of disturbance of the administrative order in the military restricted zones and the military administrative zones, the principal culprits and persons held directly responsible shall, when the case is serious, be investigated for criminal responsibility in the light of the stipulations of article 158 of the criminal law, or when the case is not so serious as to be considered as a penal offence, be punished in the light of the stipulations of article 19 of the regulations on administrative penalties for public security

    第三十三條擾亂軍事禁區、軍事管理區的管理秩序,情節嚴重的,對首要分子和直接責任人員比照刑法第一百五十八條的規定追究刑事責任;情節輕微,尚不夠刑事處罰的,比照治安管理處罰條例第十九條的規定處罰。
  7. Checking of airport tenant restricted area operator s security measures

    查察機場租戶禁區營運者施行的保安計劃
  8. 1. where the import or export shall be restricted in order to safeguard the national security or public interest

    一為維護國家安全或者社會公共利益,需要限制進口或者出口的
  9. Q. how is security deposit computed if both imported goods and export goods fall under the restricted category

    問:進口料件和製成品同時列入限制類的如何徵收臺賬保證金?
  10. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為訪問控制實施點的每個客戶端網卡,如果採用人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局域網的安全要求;網路上各個客戶端的安全級別不同,所以不同用戶的安全訪問策略規則需要集中制定。
  11. Increase the default internet security zone setting within outlook from " internet " to " restricted sites. " in addition, active scripting within restricted sites is disabled by default

    加強outlook默認安全性設置outlook中的默認internet安全區域設置由「 internet 」改為「受限站點」 。
  12. Traditional security view cannot explain why the human - being is still facing various threats, so, the research on national security is not simply restricted to the fields of military, politics and diplomacy affairs, the non - traditional security issues such as economy, environment, information, transnational crime, drug trade, terrorism, smuggle, spreadi ng illness, which are connected with national security has become the hot spot, under this background, this thesis chooses the non - traditional security as the object to discuss so as to state the main issues of non - traditional security existing in china

    於是,國家安全的研究不再僅僅局限在軍事、政治和外交領域,與國家安全密切相關的經濟安全、生態環境安全、信息安全、恐怖主義、走私販毒、疾病蔓延等「非傳統安全」問題成為國內外學者研究的熱點問題,相關領域的學者們對此展開了熱烈的討論。正是在這種背景下,本文選擇了關于非傳統安全問題作為探討方向,目的是想通過在前輩研究成果的基礎上,對新世紀中國存在的主要非傳統安全問題進行全面的論述,進而尋找應對非傳統安全問題的思路與策略,為我國的國家安全戰略服務。
  13. The code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located

    計算機的代碼訪問安全策略用於根據xslt樣式表所處的位置確定受限的權限。
  14. That is, the code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located

    沙盒型;即,計算機的代碼訪問安全策略用於根據xslt樣式表所處的位置確定受限的權限。
  15. Code that does not originate from the local computer and is therefore likely to be less trustworthy receives restricted access to protected resources under the default security policy

    在默認安全策略下,不是出自本地計算機的代碼(因而可信任度可能較低)會收到對受保護資源的受限制的訪問權。
  16. Further, i explore the developing track of secured transactions law that changed from possessory security to non - possessory, from restricted security to title financing, from typical security to non - typical security, and from unitary security device to various security devices

    即從移轉佔有型擔保到非移轉佔有型擔保、從定限型擔保到移轉權利型擔保、從典型擔保到非典型擔保以及從單一的擔保形態到多元的擔保形態。
  17. Restricted security context for eval method

    Eval方法的受限安全上下文
  18. Eval method executes scripts in a restricted security context

    Eval方法在受限安全上下文中執行腳本
  19. The restricted security context helps prevent all access to system resources, such as the file system, the network, or the user interface

    受限安全上下文有助於禁止對系統資源的所有訪問,如文件系統、網路或用戶界面。
  20. The restricted security context helps to prevent access to system resources, such as the file system, the network, or the user interface

    方法的代碼在受限安全上下文中執行。受限安全上下文禁止訪問系統資源,如文件系統網路或用戶界面。
分享友人