Examples of using Security rules in English and their translations into Polish
{-}
-
Official
-
Colloquial
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
especially as regards cases of abuse of power in the application of the security rules.
The Commission therefore proposes Community action to enhance the security in the land transport supply chain to complement existing Community transport security rules.
regardless of other connection security rules.
blocks traffic based on a defined set of security rules.
to apply by default to all connection security rules.
The Commission proposes action to enhance land transport supply chain security as a complement to existing Community transport security rules.
For each department, there are separate orders for dealing with flammable means, but security rules can be put into one common mosaic,
regardless of other connection security rules.
customs and security rules.
customs as well as the security rules.
The Monitoring item in the Windows Firewall with Advanced Security MMC snap-in allows you to monitor the active firewall rules and connection security rules on the computer.
It has been discussed especially in the Florence forum process, whether binding security rules at the European level are necessary.
in the solution chain, therefore efficient security rules need to be applied in the entire system.
It is also a smart decision for Parliament to contribute to harmonisation in Europe and to establishing more security rules.
Contrary to the principles of international law, in-flight security rules are determined by the State of registration of the aircraft,
No 1049/2001 shall be subject to strict security rules so as to ensure their confidential handling in the European Parliament.
The authentication information displayed can be configured on the Authentication tab of the Connection Security Rules Properties dialog box.
Authentication method settings you select here apply only to connection security rules that have Default selected as the authentication method.
administrator permissions from creating firewall or connection security rules that might conflict with the rules deployed by Group Policy.
contains events for both firewall rules and connection security rules.