To be prepared is to be secure from attack.
做好准备是安全从攻击。
Sure, we like to be secure from viruses. Sure, we like to save money.
当然,我们首先要在操作系统上完成自己的工作,并希望得到安全免受病毒侵袭,我们也想省点钱。
Or when must he laugh, so as to be secure from being taken up as a libeler?
或者他应当什么时候笑,以便不至于被当作诽谤者逮捕?
Enforceability----Property rights should be secure from involuntary seizure or encroachment from others.
执行力——产权应该从无意扣押或他人侵犯中握牢。
China has launched the world's first satellite into orbit using a technology to send communications back to Earth that it hopes will be secure from hackers.
中国发射了世界上第一颗量子卫星。中国希望通过使用量子技术来确保空地通信能够抵御黑客攻击。
Information must be stored so that it is secure from accidental deletion.
必须把资料保存起来,这样才不至于无意中删除。
As a result, his family's land can be protected from development, and the Altemoses will be better able to provide a secure financial future for their 7-year-old grandson.
因此,他家族的土地可以免于开发,而阿尔特莫斯一家就能够确保他们7岁的孙子未来能够得到更好的经济保障。
A security breach may result when the indication of the authenticity of the message's originator needs to be translated from one secure transport protocol to another.
当需要将消息的初始发送者的关于可靠性的指示从一种安全传输协议翻译到另一种安全性传输协议时,可能会发生安全性违规。
Companies must remain flexible, resilient, and secure, and must be ready to respond quickly to the opportunities that arise from customers, partners, and suppliers.
公司必须保持灵活性、弹性和安全性,必须随时对来自客户、合作伙伴和供应商的机会作出快速反应。
This configuration is still secure, because application CMP EJBs provide only local interfaces and, therefore, can only be accessed from the same EJB container.
该配置仍然安全,因为应用程序CMPEJB只提供了本地接口,因此只能从同一ejb容器中访问。
Until this is installed, Webmin will only be secure to run from the local console.
如果不装这个模块,Webmin只有从本地控制台运行时才是安全的。
It might be enough to simply have your application refuse all connections that aren't from 127.0.0.1, which is a lot more secure than password-based security.
可以让应用程序拒绝所有不是来自127.0.0.1的连接,这比基于密码的安全措施要安全得多。
But even in such scenarios, you might very well have the need to transfer data from or to this secure zone, which can be accomplished now using secure FTP.
但是,即使在这样的环境中,也很可能需要在这个安全区中传出数据或传入数据,这就可以用安全FTP来完成。
From a compliance perspective, the two prime factors to be considered for remote login sessions of these utilities are authentication with secure transmission and automatic logoff of remote sessions.
从遵从性角度来说,这些实用工具的远程登录会话有两个主要因素需要考虑:利用安全传输进行的身份验证和远程会话的自动下线。
However, big manufacturers could be held back by their inability to secure vital components from supply chains weakened by the downturn and unable to increase production fast enough to meet demand.
不过,由于供应链在经济衰退期间受到了削弱,大型制造商在获得重要零部件方面可能遇到困难,从而无法及时扩大生产以满足需求。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
Huang likes his new home, but with the climate getting hotter and drier, he cannot be complacent that it is secure from the sands.
黄粹昆喜欢他的新家,但是随着气候越来越炎热干燥,他不知道新家能不能抵御风沙。
This will help to ensure that the communication channel will be reasonably secure from intrusion.
这将帮助确保通道相当安全,而不受侵入。
While most American companies are secure enough to not worry about whom a partner might be meeting, there's a certain element of joy missing from the meeting experience in New York.
多数美国公司让人放心,无需担心会谈对象是谁,但在纽约约谈商业合伙人,就没啥乐趣可言。
For this purpose secure shell (SSH) is enabled on the server and can be accessed from any machine on the local network.
为此,在服务器上启用安全shell (SSH),然后就可以从本地网络上的任何机器访问DB2数据库。
In a safe and secure environment, these files should be removed from all production Web servers and applications, as they can be manipulated to allow unauthorized access.
在安全的环境中,应该从所有生产Web服务器和应用程序中删除这些文件,因为攻击者能够利用它进行非法访问。
Mining models are stored in the database and can be accessed in a secure, efficient way from cognos.
挖掘模型存储在数据库中,可以从Cognos中安全、有效地访问它们。
To invoke secure EJBs from a message-driven bean, the message-driven bean needs to be configured with a run-as role.
要从消息驱动的Bean调用安全EJB,需要为消息驱动的 Bean配置Run-as 角色。
or else, I shall be obliged to inform my master of your designs; and he'll take measures to secure his house and its inmates from any such unwarrantable intrusions!'
不然我就不得不把你的计划告诉我的主人;他就要采取手段保护他的房屋和里面住的人的安全,以防止任何这类无理的闯入!
The most common ones, aside from the two we've looked at, are the user name and password that authenticate you for access to JNDI stores that may be secure. These parameters are
除了我们已经考虑的两个之外,最常用的是用户名和密码,它们验证您对可能受保护的JNDI存储的访问权限。
From his secure personal IDE workspace, he USES IBM Rational ClearCase to check out the code to be updated and, over the course of the day, makes the necessary modifications.
从他安全的个人ide工作区,他使用IBMRationalClearCase检出需要更新的代码,在这一天中,他做出了所需的修正。
From his secure personal IDE workspace, he USES IBM Rational ClearCase to check out the code to be updated and, over the course of the day, makes the necessary modifications.
从他安全的个人ide工作区,他使用IBMRationalClearCase检出需要更新的代码,在这一天中,他做出了所需的修正。
应用推荐