传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
随着确保罗马边境安全所需资源的增加,罗马领导人之间就如何最好地保护罗马领土不受入侵部落的侵扰这一问题产生了严重的冲突。
As the resources needed to secure Rome's borders increased, serious conflicts developed among Roman leaders over how best to protect Roman territory against invading tribes.
堡垒的保护更容易因为它构造更简单:它没有窗口、几乎没有几道门,没有天窗或通风系统这些入侵者可能利用的东西。
A fortress is easier to protect because it's simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.
大自然保护协会还向众多入侵物种发起了宣战,从羊群到植物,再到具有攻击性的阿根廷蚁。
The Nature Conservancy has declared war on a multitude of invasive species here, from sheep to plants to the aggressive Argentine ant.
控制和根除外来和入侵植物互花米草对生物多样性保护管理来说是重要和必要的。
To control and eradicate the exotic and invasive plant Spartina alterniflora is important and necessary for biodiversity conservation management.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
当然可能在保密性和完整性得到保护的情况下,入侵者仍然可能导致资源在需要时可用性降低,或根本不可用。
It is certainly possible that confidentiality and integrity are protected, but an attacker could still cause resources to be less available than required or not available at all.
该安全特性为防止有害入侵提供了强力保护,并且能够使指定用户方便地访问其应该查看的文档。
This security feature provides robust protection against unwanted intrusion and provides designated users easy access to documents that they should see.
这主要是因为它是一种大分子物质,要穿过保护大脑免受血液中可能有害化合物入侵的血脑屏障很困难。
This is mainly because it is a large molecule, and has difficulty passing through the blood-brain barrier which protects the brain from potentially harmful compounds in the blood.
举例来说,如果两只蓝喉雄性侧边斑点蜥蜴正在保护其领地不受喉咙为橙色的雄性蜥蜴的侵犯时,那么其中一只蓝喉雄性蜥蜴将会忘我地上前迎战入侵者。
For example, if a pair of blue-throated males are protecting their territory from orange-throated bullies.
尽可能地保护其中每个链接上的传输以防范入侵者,这是非常重要的。
It is important to protect traffic on each of those links as much as possible to stop intruders.
为应对暴涨的丧葬费用,南非“致力于保护水资源”项目制定了一个解决方案-用外来入侵树种制造棺材。
South Africa's Working for Water program has come up with a solution to the spiraling funeral costs - use wood from invasive trees to produce coffins.
最大的弱点是安全性;没有投入任何精力来保护这些程序不受最常见入侵的危害。
The weakest point is security; no real effort has gone into making these programs secure against any but the most casual intruders.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
人们同样不会为入侵别人隐私以及为保护已经过时,频临崩溃的商业模式进行严厉的法律保护的行为进行辩解。
But there isn't a moral defense for invading people's privacy and imposing draconian laws to protect outdated, crumbling business models either.
整个管理部分必须受到保护,防止网络入侵。
The overall management portion must be protected from intrusion at the network level.
这些新的转变会保护细胞,抵御致癌物质入侵。
These last changes protect the cells against cancer-causing substances.
俄罗斯在对其入侵行为进行辩解的时候表现的非常敷衍,宣称此举是为了保护俄罗斯公民。
Russia has made perfunctory attempts to justify the invasion. It claimed that it was defending Russian citizens.
佛罗里达海洋保护者编写了一本简单的食谱,呼吁大家吃掉不断威胁近海域珊瑚礁生态平衡的入侵者狮子鱼。
Florida Marine conservationists have come up with a simple recipe for fighting the invading lionfish that is gobbling up local reef life — eat them.
为了守卫气孔,这些年老雌性蚜虫会用粘腊将自己和入侵者们黏在一起,封堵入口以保护虫瘿内的幼虫及可繁殖蚜虫。
They defend the pore by gluing themselves to intruders, blocking the entrance and protecting the younger, fertile insects cloistered within.
现在你已经知道了这一点。为了保护自己免遭数码入侵,你能做的最简单的事情之一就是常常更换密码。
You know this by now. Changing your passwords frequently is one of the simplest things you can do to protect yourself from digital invasion.
记住,我们为和平而来,我们从任何入侵中保护你们,那些可能的攻击你们的企图。
Bear in mind that we come in peace, and are to protect you from any other intrusion and possible attack upon you.
对于这些黑暗力量入侵的回应,你想着要去保护地球上的生命。
As a reaction to the intrusion of these dark powers, you wanted to protect life on earth.
Cozett说,“致力于保护水资源”项目已建立了若干家小型企业,用外来入侵树木为原料生产普通家具、林地覆料以及有机肥料。
Cozett says Working for Water has already set up a number of small businesses using wood from the invasive alien plants for garden furniture, mulch, and organic fertilizer.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
应用推荐