网络总体安全性的强度取决于其最薄弱的环节,而在移动商业网络中,最薄弱环节是客户机端设备。
The overall security of a network is only as strong as its weakest link, and in a mobile-commerce network the weakest link is the client-side device.
EclipseIDE和IBMLotusExpeditor有效地将签名安全机制应用到它们的供应子系统中,从而在将插件部署到终端用户桌面时增强它的安全性。
The Eclipse IDE and IBM Lotus Expeditor effectively apply signature security mechanisms in their provisioning subsystems by enhancing the code security level when it's deployed to end users' desktops.
传输层安全性(Transport LayerSecurity,TLS)是传输层的安全标准,而在SOAP消息级别,WS-Security 是首选的安全规范。
Transport Layer Security (TLS) is the standard for security at the transport layer, while at the SOAP message level, WS-Security is the specification of choice.
在大多数Web应用程序开发场景中,开发人员通常都会出于便利性的考虑而在他们的应用程序逻辑中实现安全性。
In most Web application development scenarios, convenience often leads developers to implement security in their application logic.
票据质押作为一种权利质押形式,由于其强流通性、高安全性而在实务中倍受青睐。
Bill hypothecation as a form of pledge is very popular in practice because of its character of circulation and security.
网络总体安全性的强度取决于其最薄弱的环节,而在移动商业网络中,最薄弱环节是客户机端设备。
The overall security of a network is only as strong as its weakest link, and in a mobile - commerce network the weakest link is the client - side device.
而在紧急情况下,首要目标是运行的安全性,其次才是经济性。
In emergency condition, the first objective is to operative security, secondary is economically.
然而在电力市场环境下,电力系统运行的经济性与安全性的矛盾更加突出。
In the new electricity market environments, the conflict between transmission systems security and economical operation is more and more severe.
而在自由行中,游客需要自己甄别旅游项目的规范性和安全性,这就对游客的经验和安全意识提出更高要求。
In the freedom of travel, visitors need to identify their own tourism project specification and security, which put forward higher demands on the experience and safety of tourists.
公路客运作为旅客运输的重要方式,对客车性能有较高要求,而在众多性能中,安全性位居首位。
Road passenger transport as an important mode of passenger on the bus have high requirements for the bus performance, and the security ranks in many properties.
而在系统健壮性方面,采用系统进程隐藏及软、硬件结合的软件保护方法,保证系统自身的安全性和完整性。
In system robust respect, this paper USES process hidden and software protected technical which combining software with hardware to insure system's integrality and security.
“为确保植入粒子的安全性,在1987和1991之间采用的是拍摄正交片的方法”,研究作者写道。 “而在1992, 使用的则是CT扫描剂量测定法。 ”
"Postimplant quality assurance was by the use of orthogonal films between 1987 and 1991, " the authors wrote. "In 1992 postimplant CT scan dosimetry was performed. "
“为确保植入粒子的安全性,在1987和1991之间采用的是拍摄正交片的方法”,研究作者写道。 “而在1992, 使用的则是CT扫描剂量测定法。 ”
"Postimplant quality assurance was by the use of orthogonal films between 1987 and 1991, " the authors wrote. "In 1992 postimplant CT scan dosimetry was performed. "
应用推荐