遵照建筑规程的第6条实施了安全措施。
Safety measures were carried out in compliance with paragraph 6 of the building regulations.
严格的安全措施在首都实施。
所以,除非你明确知道这个应该拒绝,否则你应该做的是加强安全实施,例如:更好的密码策略和限制用户的工作站。
So, unless you know exactly what you need to deny, you should tighten the security by implementing e.g. better password policies and restrict users' workstations.
所以,除非你明确知道这个应该拒绝,否则你应该做的是加强安全实施,例如:更好的密码策略和限制用户的工作站。
So, unless you know exactly what you need to deny, you should tighten the security by implementing e.g. better password policies and restrict users workstations.
越南国家头盔法是由国家交通安全委员会制定并实施的。
The Viet Nam national helmet legislation was developed and implemented by the national Traffic Safety Committee.
但是,日益恶化的安全形势继续阻碍在受影响地区实施控制措施。
However, the deteriorating security situation continues to hamper control measures in the affected area.
使用FUSE您可以开发功能完备的文件系统:其具有简单的api库,可以被非特权用户访问,并可以安全的实施。
FUSE lets you develop a fully functional filesystem that has a simple API library, can be accessed by non-privileged users, and provides a secure implementation.
因此,像职责分离这样的标准安全措施得不到实施,因为没办法只提供给用户那些仅够他们展开工作的权限。
Thus, standard security measures, such as duty sepa-ration, can't be implemented because it's impossible to provide users with only those privileges they strictly require to carry out their work.
刚开始时,它显示了典型的ea规则,例如企业安全和系统管理,它通常是关键的SOA实施方面。
Initially, it shows typical EA disciplines, such as enterprise security and systems management, which are also key SOA implementation aspects.
EJB技术可以在任何EJ b组件或方法上实施方法级的安全策略。
However, EJB technology allows method-level security on any EJB component or method.
下图说明用于管理安全策略的一种操作策略实施架构风格。
An illustration of an operational policy enforcement architectural style for managing security policy is shown in the figure below.
重复本文中导出、导入和实施安全模型的步骤。
Repeat the steps you followed in this article to export, import, and enforce your security model.
在本文中,我们关注e - Commerce系统中可能出现的袭击场景以及您可以实施的预防策略,包括安全特性。
In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features, that you can implement.
事务安全是MDMServer 中实施的第一级授权。
Transaction security is the first level of authorization enforced within MDM Server.
WebSphereDataPowerSOA设备也用于对需要安全会话的Web服务实施安全策略。
The WebSphere DataPower SOA appliance is also used to enforce the security policy of the web service that requires the secure conversation. The scenario was implemented on
一旦配置完成,这些附加数据库和设置使用户界面和口令控制实施增强的安全特性。
Once configured, these additional databases and Settings enable the user interface and password controls to enforce the enhanced security features.
本来可以阻止灾难发生的工程措施没有实施,设备安全测试也是一拖再拖。
Engineering measures that might have prevented the calamity were not carried out, tests of safety equipment delayed.
有时候,系统管理员希望实施不同的安全策略,这时就可能需要修改或替换身份验证方法。
At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.
比如泛型更改——泛型类型信息——由编译器用于实施编译时安全,但是生成的字节码仍然到处使用强制转换。
Likewise with the generics changes — the generic type information is used by the compiler to enforce compile-time safe usage, but the generated bytecode still USES casts everywhere.
这样会极大地提高电脑的整体安全状况:普通人会感到安全,法律的实施和安全专家能够更加专注于更大的危害。
That would vastly improve the overall computer-security situation: Ordinary people would feel secure and law enforcement and security specialists could focus on the biggest threats.
始终要验证所实施的安全措施实现了通过跟踪审计的目的。
Always verify that the implemented safeguards accomplish what was intended through follow-up audits.
第二个请求将根据客户端的信任策略集和绑定中的配置实施安全保护。
The second request will be secured as configured in the client's trust policy set and bindings.
有迹象显示该工厂已对自己的工人至少实施了起码的安全程序,其中的很多工人来自外村。
There are signs that the Xinsi factory followed at least rudimentary safety procedures with its own workers, many of whom came from outside the village.
只有在确立了发送消息的用户的真实性之后,才能够实施安全措施。
One can put the security measures only after establishing the authenticity of the user who is sending the messages.
对虚拟机之间通信所用的内部虚拟网络的控制不够明确,难以实施安全策略。
Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.
在日常工作中,我发现许多用户因为网络管理人员实施的新的安全规则而倍受挫折。
In my day-to-day work, I have found that many users are frustrated by new security imperatives imposed by network managers.
在访问内部对象之前对内核代码进行修改,以调用一个代表实施函数的钩子,该实施函数实现安全策略。
Kernel code is modified prior to accessing internal objects to invoke a hook that represents an enforcement function, which implements the security policy.
在约旦河西岸,巴拉克说,那些零散的定居点将被拆除,只保留原边境附近的大聚居区,并且今后将实施“严格的安全部署”。
On the West Bank, Mr Barak says, the spread-eagled settlements would be dismantled and only the large settlement blocks near the old border retained.
在约旦河西岸,巴拉克说,那些零散的定居点将被拆除,只保留原边境附近的大聚居区,并且今后将实施“严格的安全部署”。
On the West Bank, Mr Barak says, the spread-eagled settlements would be dismantled and only the large settlement blocks near the old border retained.
应用推荐