See direct call security or alarm...
见到直接去叫保安或报警。
NOTE: Call security for any security problems.
注意:出现安全问题应求助安全部门。
Eventually, they'd call security and have me escorted off the lot.
最后,他们都会叫保安和门卫还护送我出去。
Why should the Assistant Manager call Security for assistance?
为什么大堂副理要寻求安全部的帮助?
Call Security, say 'Fire' and give your name and exact location.
给安保打电话,说“发生火灾”,说出你的名字和确切地址。
It still looks new but it's been there awhile…" I'm sure the doorman was like, "call security.
它看起来非常新,但他已经在这有很长时间了…”,我肯定看门人更象是保安。
In case act of violence, on site security personnel should immediately call security manager and on call Duty personnel.
如果发生暴力行为,现场安全保卫人员应立即打电话给安全经理与候叫人员。
The knee-jerk reaction to this is to call for proper security in all hospitals.
对此类状况的第一反应是要求所有医院都采取相应的安全措施。
We race to get all our ground work done: packing, going through security, doing a last-minute work call, calling each other, then boarding the plane.
我们争分夺秒地完成所有的基础工作:打包行李,通过安检,在最后一分钟打个工作电话,互相打电话,然后登机。
"McAfee has been executing very well and the importance of security has never been greater," Otellini said during the earnings call.
“迈克菲已经最大限度被利用,没有有比这更大的安全重要性,”欧特宁在财报电话会议中说。
But there is a calling that is yet above high office, fame, lucre and security. It is the call of conscience.
但是在高官、名誉、财富和安全之上,还有另一个声音在召唤着我,是良知的召唤。
Intelligence to prevent attacks is part of what experts call a "layered" security approach.
防止袭击的情报是专家所说的“分层”保安措施的一部分。
One option is to call computer security experts.
选择之一是请求计算机安全专家的帮助。
Tokens can also be used for transmitting security related information for a single remote call.
令牌还可以用于为单个远程调用传输安全相关的信息。
If no security permission is specified, no permissions are checked and all callers are permitted to call the interface or operation.
如果没有指定安全许可,则没有许可检查,所有调用方都允许调用接口和操作。
Use this method to set the DCE security level for this RPC call.
使用该方法为这个RPC调用设置dce安全级别。
AIX security commands and applications can be configured to call PAM modules through the use of existing loadable authentication framework.
可以对AIX安全性命令和应用程序进行配置,以便通过使用现有的加载式验证框架来调用PAM模块。
If the security permission qualifier is specified, the identity of the caller must have the designated role in order to be permitted to call the interface or operation.
如果安全许可限定符是指定的,调用方的身份必须有指定角色来获得调用接口或操作许可。
Motivational Memo: Greatest security is often found within what most people call insecurity.
励志心语:最大的安全总是在被绝大多数人眼中的危险之地找到。
If the EJB layer is not secured (see the next section), intruders can call an EJB directly with forged credentials, rendering the application's security meaningless.
如果ejb层不安全(请参见下一部分),则入侵者可以使用伪造的凭证直接调用EJB,使应用程序的安全性无效。
This data and ultimately the print data are being put to use in a variety of ways ranging from security codes to what you could call gimmicks.
人们正以各种各样的方法——从安全码到所谓的隐形图案,来使用这些资料及其印刷品。
It is the common call of people to discard the old way of thinking and replace it with new concepts and means to seek and safeguard security.
人们普遍要求摒弃旧的观念,以新的方式谋求和维护安全。
The quality of operation aspect is measured by being able to ensure a listener's ability to listen to arrival of data, ability to invoke a remote call as well as access control and transport security.
操作方面的质量是通过保证监听器监听数据到达、发起远程调用以及访问控制和传输安全性等功能判断的。
Prime Minister Gordon Brown has said that Britain regarded the thwarted attack as “a wake-up call” requiring a review of airport security measures and border controls, among other things.
英国首相戈登·布朗表示,该起未遂袭击警示英国应高度重视航空安全措施和口岸管理。
The header contains additional information that is useful in processing the call, such as security, authentication, session information, or any other useful data.
Header包含了对处理调用非常有用的附加信息,如安全、验证、会话信息或者其他任何有用的信息。
Clients request will be routed to the web service proxy so that the message of service will be enforced to add message protection by security policy during the service transaction call.
客户请求将被路由到该Web服务代理,这样安全策略将强制服务消息在服务事务调用期间添加消息保护。
The V8 security system can then fetch the security callback of the object being accessed and call it to ask if another context is allowed to access it.
V8的安全系统可以获取被访问对象的安全回调函数,并且调用它来判断是否允许另外一个context去访问它。
The snippet in Listing 9 shows how to call the EJB method under the identity of a subject whose credentials were received from the security handler.
清单9中的片段展示如何从安全处理程序接收主体的凭证,并以这个主体的身份调用EJB方法?
The snippet in Listing 9 shows how to call the EJB method under the identity of a subject whose credentials were received from the security handler.
清单9中的片段展示如何从安全处理程序接收主体的凭证,并以这个主体的身份调用EJB方法?
应用推荐