Does the facility have a written security procedure policy?
工厂有无书面(成文)的安全政策?
Meanwhile security procedure whose relevant norms allocates the losses arising out of fraud among the parties serves as the authentication means of payment order.
安全程序是支付命令的认证手段,其相关规则将欺诈损失在各当事方间进行了分担。
The rail tickets remind passengers to be onboard a mere two minutes before departure, and the only security procedure involves passing large suitcases though a scanner.
火车票上的注意事项提醒乘客,检票将在发车前2分钟停止;而唯一可以称得上安检的,就是要对大件行李进行扫描。
As the most advanced law regulating large value electronic fund transfer, Article 4a of Uniform Commercial Code creates some new concepts and norms, say, "payment order", "security procedure".
作为世界上调整大额电子资金划拨最完善的法律,美国《统一商法典》第4A编创设了“支付命令”和“安全程序”等全新的概念与规则。
Social Security law and procedure remain a jungle of complex rules.
社会保障法律和程序仍然是充满复杂规定的一团糟。
The government is to make major changes to the procedure for carrying out security vetting.
该政府将对执行安全审查的程序作出重大调整。
Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.
当然,你可以通过良好的密码策略和执行验证程序在公司中配备适当的安全级别。
The procedure for enabling security on you test server will vary depending upon the particular user registry you choose to use.
在测试服务器上启用安全性的过程因您选择使用的特定用户注册中心而异。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Users of NFS may now conduct secure transactions using a remote procedure call (RPC) implementation of the General Security Service (GSS) API.
使用通用安全服务 (General Security Service,GSS)API的远程过程调用 (remote procedure call,RPC)实现,NFS的用户现在可以进行安全的事务处理。
What is the procedure of the security check?
安全检查的手续是怎么样的?
This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.
这里详细介绍了SET的基本概念、所使用的主要技术以及运行的过程,同时分析了SET是怎样解决网上交易安全性的。
In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.
同时该系统采用相关网络安全技术,保证了执行任务过程中信息交互的安全性。
Is there an established procedure to conduct unannounced security checks periodically for all areas of concern?
是否有相关制度,对所有重点区域是否定期进行突击安全检查?
Confirmation as a process from evidence to conclusion, the procedure should have strict legal and logical security.
认证作为从证据到结论的确认过程,其程序应有着严格的法律和逻辑上的保障。
Does the facility have procedure and training for employees to recognize and report any potential security threat?
工厂是否有培训所有员工的程序,使他们能识别和报告一切潜在的安全隐患?
Adding procedure of investigation in the Penalty Law of Public Security Management is of realistic inevitability.
《治安管理处罚法》中“调查”程序的增设,具有现实必然性。
Connects partially completes after the multichannel working procedure manufacture, stability good, reliability strong, the security is high.
连接部分经多道工序制作完成,稳定性好,牢固性强,安全性高。
The goal of police tactics is to guarantee the safety of law enforcement, including security awareness and procedure awareness.
警务战术的目标就是为了实现执法安全,包括执法安全意识和警务程序意识两方面。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
Is there a procedure for in-country carriers to report in-transit security violations to the facility management?
是否有相关程序,规定国内运输商如何向企业管理层汇报运输过程中违反安全规定的情况?
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
In this paper, a structure of application layer security system for CIMS network is proposed, the security mechanism and the service procedure of the system is developed in detail.
本文提出一种CIMS网络应用层安全系统结构框架,并详细介绍了系统安全机制及服务过程。
Now, used SSL VPN, the security feature has already had the change, the people may through the browser visit application procedure.
现在,使用SSLVPN,安全特性已经发生了改变,人们可以通过浏览器访问应用程序。
From 1998 to 2011, Sylvia was a full-time lecturer with Temasek Polytechnic where she taught and researched civil and criminal procedure, criminal justice and private security.
1998年至2011年,瑞莲在淡马锡理工学院担任全职讲师,研究并教授民事与刑事诉讼程序、刑事司法及私人保安。
We, the undersigned, strongly urge you to speak out and vote against any motion or procedure to grant Japan the status as a permanent member of the United Nations Security Council.
我们下列签署人极力主张阁下明确发言并投票反对日本成为联合国安全理事会常任理事国之任何议案或程序。
The security feature of DHAAD(Dynamic Home Agent Address Discovery) procedure was analyzed, and a solution was proposed to protect it.
分析了动态家乡代理地址发现过程的安全特性,提出了一个对此过程进行安全保护的方案。
The security feature of DHAAD(Dynamic Home Agent Address Discovery) procedure was analyzed, and a solution was proposed to protect it.
分析了动态家乡代理地址发现过程的安全特性,提出了一个对此过程进行安全保护的方案。
应用推荐