Of course, however good the van is, it will need adapting so the wheelchair can go in and be secure .
当然,不管车子怎么好,也需要改装才能安全地放进轮椅。
And the program seems to be working: crime is down and our citizens report that they feel more secure.
这个项目似乎正在发挥作用:犯罪率下降了,而且我们的公民报告说,他们感到更安全了。
As a result, his family's land can be protected from development, and the Altemoses will be better able to provide a secure financial future for their 7-year-old grandson.
因此,他家族的土地可以免于开发,而阿尔特莫斯一家就能够确保他们7岁的孙子未来能够得到更好的经济保障。
The program seems to be working: crime is down and our citizens report that they feel more secure.
这个项目似乎正在发挥作用:犯罪率下降了,我们的公民说,他们感到更安全了。
Having configured SSL for their customers and believing them to be secure, the vendor had overlooked the fact that SSL does not restrict which channel the client can use.
为客户配置SSL并相信它们是安全的,但供应商忽略了一个事实,即SSL并没有限制客户端可以使用哪个通道。
Avoid relying on it now and write your PHP applications to be secure without it.
从现在开始应避免使用它并在此情况下编写安全的PHP应用程序。
To be effective, this approach requires that the network link between the requestor and provider be secure and that the subscriber not provide third party access to their certificate.
要提高效率,这种方法要求请求方及提供方之间的网络连接是安全的,并且没有为订阅者提供对他们的证书的第三方访问。
With its cool climate, abundant geothermal energy and secure remoteness, Iceland appears to be a prime location for data archives.
它的理由基于冰岛的优势:气候凉爽、地热能源丰富并偏远安全,是数据储存的理想地点。
That made me think about the tools I use to secure the computer I use for online banking, which has to be as secure as possible (and practical).
这让我提醒自己,在我那台用于网上银行业务的电脑上用来保护系统安全的工具必须要尽可能的安全(而且还要有效)。
If Afghanistan is not secure, then Pakistan will not be secure and Britain will not be secure.
如果阿富汗是不安全的,那么巴基斯坦也不会安全,接着,英国也不会安全了。
Their analysis, if supported by experimental evidence, could contribute to a new generation of wireless technology that would be more secure and resistant to interference than conventional devices.
他们的分析结果如果能得到实验的证据的支持,就会帮助开拓新一代的无线技术,它比普通的设备更加安全且抗干扰。
Pathways between all participants must be reliable and secure, and IBM must have visibility to all events as they occur, in addition to being able to collect all data as it is produced.
所有参与者之间的通路必须可靠和安全,而且IBM必须能看到出现的所有事件,还必须能够收集产生的所有数据。
SSH offers certificate based authentication, strong encryption, and other features, and is considered to be far more secure.
SSH提供基于验证的证书、强加密和其他特性,并且被认为安全多了。
It allows both unilateral and mutual authentication to be accomplished without the use of secure timestamps.
它不需使用安全时间戳即可完成单向和双向身份验证。
In order to pick up these changes, the secure proxy servers must be stopped and started.
要获得这些修改,并且停止并重新启动安全代理服务器。
Companies must remain flexible, resilient, and secure, and must be ready to respond quickly to the opportunities that arise from customers, partners, and suppliers.
公司必须保持灵活性、弹性和安全性,必须随时对来自客户、合作伙伴和供应商的机会作出快速反应。
Most organizations want to be at least "good enough," and "good enough" is tightly related to what is supposed to be secured — and how secure it has to be.
大多数的公司至少想要“变得足够好”,而“变得足够好”与最初要保护什么紧密相关:它究竟要变得有多安全。
The Thales SONET Datacryptor and lower speed Datacryptors will be deployed to secure the JHITS network.
部署泰利斯公司的同步光纤网数据加密机和更低速率的数据加密机是为了确保JHITS网络的安全。
Nuclear energy is clean, and it must also be safe and secure.
核能是清洁的,也必须是安全的。
To clarify the importance of careful configuration, we are going to specifically discuss the IBM provided WebSEAL TAI, but any TAI requires careful design and configuration to be secure.
为了阐明仔细配置的重要性,我们准备具体讨论IBM提供的WebSEALTAI,但任何TAI都需要认真设计和配置才能够安全。
To make clear the importance of careful configuration, this article specifically discusses the IBM provided legacy WebSEAL TAI, but any TAI requires careful design and configuration to be secure.
为了说明仔细配置的重要性,本文具体讨论IBM提供的遗留WebSEALTAI,但任何TAI都需要认真设计和配置才能够安全。
And, all of these connections need to be secure and governed for performance.
并且,所有这些连接都应该安全地进行,其性能也应被管理起来。
Network and data security can be guaranteed by establishing point-to-point secure connections.
可以通过建立点对点安全连接来保证网络与数据安全性。
Our recovery includes rebuilding an infrastructure that will be more secure and reliable in the face of terrorist threats and natural disasters.
我们的恢复行动包括重建一个可以在恐怖威胁和自然灾害面前更加安全和可靠的机构。
You can tailor the passwords to be memorable or secure, and you can specify whether to include Numbers, symbols, vowels, and capital letters.
可以把密码设定为更容易记忆的或更安全的,还可以指定密码是否包含数字、符号、元音和大写字母。
Keep in mind that business logic and secure data should be maintained on the server.
请记住,业务逻辑和安全数据应该在服务器上进行维护。
Keep in mind that business logic and secure data should be maintained on the server.
请记住,业务逻辑和安全数据应该在服务器上进行维护。
应用推荐