坚持使用这些安全的网站,不要出去尝试新的东西。
Stick to these sale websites and don't go out to try something new.
图4展示了这些安全模型元素。
这些安全属性包括主体身份和组信息。
These security attributes are the principal identity and the group information.
我可以说出选择这些安全设置的数个理由。
这些安全站已经联合部署美国人和伊拉克人。
服务调用技术必须能够提供所有这些安全功能。
Service invocation technologies must be able to provide all of these security capabilities.
一定要注意一点:这些安全改进并不是完美的。
One important caveat is that these security improvements aren't perfect.
阿美:吉米,这些安全检查是关于什么的啊?
这些安全标准将用于构造整个SOA实现中的安全消息。
These security standards will be used to construct secure messages throughout an SOA implementation.
你可以搭配这些安全过滤器来创建高度定制的安全体验。
You can mix and match these security filters to create a very custom security experience.
您可以使用put/get方法来访问这些安全属性。
You can simply use put/get methods to have access to the security attributes.
这些安全小组就会努力跟上新的以及变更的应用程序的节奏。
The security teams struggle to cope with the pace of new and changed applications.
ApplicationServer测试环境将使用这些安全设置。
These security Settings are used by the Application Server test environment.
这些安全保险会不会让他们的员工安心工作而不是担心家中孩子无人照管?
Doesn't the security of insurance help his employees focus on their jobs instead of worrying about the untreated child at home?
其中包含了2003年颁布的安全规则,医疗行业必须遵守这些安全标准。
It has a security Rule, issued in 2003, which comprises of the security standards to be followed by this industry.
AmazonEC2调用这些安全组并使用API调用和命令来操作它们。
Amazon EC2 calls these instances security groups and has API calls and commands to manipulate them.
为了满足这些安全需求,必须使用多层身份验证或多因素身份验证,或这两者的组合。
To meet these stronger security needs, either multi-layer authentication or multifactor authentication or combinations of both are used.
第一,正确设置这些安全设置,它可以帮助windows抵抗一些对系统的常规攻击。
First, there are standard attacks that are launched on Windows environments which these security Settings can help protect against, if configured correctly.
我应用了Daniel建议的这些安全举措,并找到了一些支持这些功能的插件。
I applied the security measures that Daniel suggested and also searched for plugins that could help.
使用这些安全传输的方式和本节中所讲的方式是一样的,你仅仅需要提供额外的安全属性,如证书。
You use these secure transports the same way as the ones mentioned in this section, you just have to supply some additional security properties such as certificates.
考虑到所有这些安全运用自动化交通运输系统的经验,开发由自动控制操纵的公路车辆算不上什么大的飞跃。
Given all of this experience in implementing safe automated transportation systems, it is not such a large leap to develop road vehicles that can operate under automatic control.
当需要提供安全相关的附加信息并将其附加到实际用户标识(主题)时,可以使用这些安全属性来保存该信息。
When additional security related information should be present, attached to the actual user identity (subject), then security attributes can hold this information.
这些安全断言在definition.xml文件中使用policySetSCA元素进行定义。
These security assertions are created in a definition.xml file using a policySet SCA element.
问题在于是否有必要制定最新而且更具体的机器人安全规则——如果需要,这些安全规则具体应该怎么写?
The question is whether new, robot-specific safety rules and regulations are needed-and, if so, what they should say.
问题在于是否有必要制定最新而且更具体的机器人安全规则——如果需要,这些安全规则具体应该怎么写?
The question is whether new, robot-specific rules are needed—and, if so, what they should say.
微软已经发布了IE安全更新包(KB 974455),一周前用户就可以通过自动更新下载这些安全包。
Microsoft has issued a cumulative security update for IE, KB 974455, that started to be delivered to the users via automatic updates more than a week ago.
这些安全系统可以发出警报来提示安检人员行李内存在可疑物品,但是它们却无法告知这些可疑物品具体是什么。
These systems can alert an operator to something suspicious, but they cannot tell what it is.
ApplicationServer提供一个框架,用于在消息的发送方一侧生成安全令牌,并在消息的接收方一侧验证这些安全令牌。
Application Server provides a framework to generate security tokens on the sender side of the message and to validate these security tokens on the receiver side of the message.
SSRM帮助处理SOA的安全需求,由于服务和操作跨组织的边界松散耦合,增加了风险和漏洞的暴露,从而导致了这些安全需求。
The SSRM helps to address the security requirements of the SOA due to increased exposure to risks and vulnerabilities of loose coupling of the services and operations across organizational boundaries.
SSRM帮助处理SOA的安全需求,由于服务和操作跨组织的边界松散耦合,增加了风险和漏洞的暴露,从而导致了这些安全需求。
The SSRM helps to address the security requirements of the SOA due to increased exposure to risks and vulnerabilities of loose coupling of the services and operations across organizational boundaries.
应用推荐