Chinese officials say the expansion in Antarctica prioritises scientific research, but they also acknowledge that concerns about "resource security" influence their moves.
中国官员表示,在南极的扩张优先考虑科学研究,但他们也承认,对“资源安全”的担忧影响了他们的行动。
Chinese officials say the expansion in Antarctica prioritises scientific research. But they also acknowledge that concerns about "resource security" influence their moves.
中国官员说,在南极洲的拓展以科学研究为重点。但他们也承认,对“资源安全”的担忧限制了行动。
But it seems reasonable to think sunscreen gives people a false sense of security in the sun.
但是认为防晒霜会让人们在阳光下产生一种虚假安全感的这种想法似乎是合理的。
Your security is not in your bank account but in the Lord.
你的安全并不在你的银行账户里,而在于上帝。
But demanding too much of air travelers or providing too little security in return undermines public support for the process.
可是,如果对飞机乘客的要求过于苛刻,或者相应的安全保障太少,反过来就不利于民众对安检的支持。
All these proposed changes were part of a new border-security bill that passed the House of Representatives but died in the Senate last week.
受到提议的所有改变都是一项新的边境安全法案的一部分,该法案在众议院通过,但上周在参议院被否决。
But security in Israel improved progressively from the spring of 2002.
但从2002年春天开始,以色列的安全形势逐渐改善。
It is not true security, but it can be useful in certain contexts.
这并不是真正的安全,但该方法在某些情况下很有用。
Both have an interest in the security of the Gulf -but also in depending less on its oil.
他们都极其关注海湾地区的安全问题,但同时也都在削减对这一地区的石油依赖度。
But in the real world, we see the security dilemma faced by every country.
但这个世界是现实的,每一个国家都面临着安全困境。
End user identities are not used in security enforcement but may be included in data for audit.
安全执行中不使用最终用户标识,但可能包括在数据中用于进行审核。
But in the cloud, a company has no control over the security measures adopted.
但是,进入了“云端”,公司就失去了对自己原有的安全措施的控制力。
When the stock price daemon publishes the change, using a system account, each listener will be notified, but in the listener's security context (Figure 4).
当股票价格守护程序发布更改时,将通过系统帐户通知每个侦听器,但仅在侦听器的安全上下文中进行通知(图4)。
The dangers outlined by the CNA report mostly lie in the future, but there are security concerns connected to global warming that threaten us right now.
CNA报告大致列出的危险大多潜伏于未来,但是与全球变暖联系在一起的安全问题已经开始威胁着我们。
To be sure, computer security companies are in the business of not only finding but also marketing security risks.
为确保无误,电脑安全公司不单在做寻找但也再做销售安全风险的生意。
These two functions may seem different, but they interrelate in that security tokens must be trusted, and trust must be represented by some form of token.
这两个函数看起来虽然不同,但它们之间是相互关联的,都要求安全令牌必须是可信的,并且信任也必须要以某种形式的令牌表示。
But, back in Ergneti, Goderdzi Kasradze says there'll be no security until the Russians are really gone.
但是,在厄尔涅梯村,卡斯·拉泽说,只要俄罗斯人不真正撤退,就不会有安全。
Cash may provide security but offers virtually nothing in yield.
现金放在手上更为安全,但完全不能产生收益。
Steps for enabling security are included, but the scenario can be run without security in non-production environments.
场景中包括启用安全性的步骤,但也可以在非生产环境中以不启用安全性的方式运行。
But like any security system, in practice it is only as safe as its weakest link.
但和任何安全系统一样,在实践中其安全度取决于系统里最薄弱的一环。
IPsec is an optional security component of IPv4, but in IPv6 it is mandatory.
IPSec是IPv4的一个可选的安全组成部分,但在IPv 6是强制性的。
This is extended to assemblies in the same folder but not in any subfolder. The .NET Security Blog has more details.
这把程序集扩展到同一个文件夹而不是在任何子文件夹里,The .NETSecurityBlog有更多的细节内容。
Meanwhile, Jed Rubenfeld of Yale Law School has tried to reinterpret (.pdf) the Fourth Amendment not in terms of privacy, but in terms of security.
同时,耶鲁法学院的Jed Rubenfeld 也试图从安全感而非隐私的角度重新解释第四修正案。
But it also means more security, in the long run, for Israel.
更加公正的立场意味着对巴勒斯坦人更多支持,从长远看来,也意味着对以色列更多的安全保障。
But if you're working in a high security environment you need to take into account all of the possibilities discussed in this article.
但是,如果您工作在一个对安全性要求很高的环境中,那么您需要考虑本文所讨论的各种可能性。
An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
There are lots of applications that aren't troublesome in themselves, but have potential security holes, like when a port or protocol used normally by that app has vulnerabilities.
很多应用程序本身没有问题,但是存在潜在的安全漏洞,比如这种应用程序所使用的某个端口或协议存在漏洞。
There are lots of applications that aren't troublesome in themselves, but have potential security holes, like when a port or protocol used normally by that app has vulnerabilities.
很多应用程序本身没有问题,但是存在潜在的安全漏洞,比如这种应用程序所使用的某个端口或协议存在漏洞。
应用推荐