• We should place equal emphasis on development and security, and develop nuclear energy on the base of security.

    坚持发展安全并重,在安全基础发展核能

    youdao

  • The concept of promoting development and security through cooperation has taken a deeper root in the hearts of all.

    合作发展,以合作谋安全理念更加深入人心。

    youdao

  • The establishment and crash of the regional system both depend on the economic development and security condition of the countries in the south sea.

    地区体系建立崩溃取决于南海诸国的经济安全能否得到保障。

    youdao

  • General Richards sums up the need as reconstruction, development, governance and relations with Pakistan, all wrapped up in a environment of growing security.

    查兹将军总括事,诸如重建、发展治理巴基斯坦关系所有这些都亟需愈加安全的环境

    youdao

  • Yet this enormous resource is not contributing enough to today's global challenges, including climate change, security, sustainable development and health.

    然而一庞大的资源尚未对应对当今全球性挑战做出足够的贡献,例如气候变化安全问题可持续发展健康问题等。

    youdao

  • TATA Advanced Systems, as the lead on the program, along with other TATA partners will be responsible for project management, security, software development, production, integration and delivery.

    塔公司先进系统分部该项目的领导者,它其他伙伴一起负责计划管理安全软件开发制造集成交付等工作

    youdao

  • In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.

    特别是其中研究了企业数据访问隐私安全顾虑以及某些轻量级开发工具。

    youdao

  • For the Rugged Manifesto to succeed, it would need support from the software development community and not just from the application security community.

    坚固软件宣言”要成功,需要得到软件开发社区支持仅有应用安全社区的支持是不够的。

    youdao

  • Jorrit Kamminga is senior policy analyst at the International Council on Security and Development.

    乔里特·明加国际安全开发理事会资深政策分析人士

    youdao

  • It's divided into categories like J2EE development, security, and migration, so you can zero in on the topics of most interest to you.

    分成几类例如J2EE开发安全性迁移因此可以专心学习对您最为重要主题

    youdao

  • Application design and implementation: Actions that are taken by developers and designers during development that are crucial to security but might have little impact on the deployment process.

    应用程序设计实现开发人员和设计人员在开发期间所采取安全性至关紧要操作但是这些操作可能部署过程没有影响

    youdao

  • Beyond that, some governance must be in place to prevent the development team from doing anything that would compromise the integrity of the systems and security.

    除此之外,必须准备某些治理防止开发团队任何危害系统完整性和安全性事情。

    youdao

  • In this article, we'll mainly focus on the security challenges and solutions currently available or in development for MIDP applications.

    本文中,我们主要集中讨论MIDP应用程序安全性挑战以及当前可用处于开发中的解决方案

    youdao

  • Tes perform a quick testing or a double check to notice any major bug that went unnoticed by development, and they provide user testing plus performance, security and other similar testing.

    TE快速地测试系统或者再次检查那些开发人员忽略主要缺陷并且他们协助用户测试,进行性能安全以及其他类似的测试。

    youdao

  • The product design favors ease of use and easy integration into the development tools and process over advanced security drill-down functionality.

    这个产品设计偏好使用简便以及轻松地整合开发工具过程中,胜过高级安全性功能的开发。

    youdao

  • Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.

    积极参与选择技术标准评估挑选工具宏观微观设计开发测试实现重用以及安全方面等等

    youdao

  • In 2002, Microsoft launched an ongoing effort to improve security throughout its development process that involves training and process improvements.

    2002年,微软开始致力于通过它自己开发过程提高软件的安全性包括培训过程的改进。

    youdao

  • The technology available today is mainly designed for security professionals, and does not always meet the needs and use cases of development.

    当今可利用技术主要安全专家所使用,通常没有满足开发需求

    youdao

  • As the two development teams and project managers meet, weekly, they review Security, Schemas, Standards, data transformation requirements, and a host of other integration requirements.

    随后两个公司的开发人员项目经理们每周碰面安全计划标准数据转换以及其他一揽子需求进行讨论磋商。

    youdao

  • It is an easy to use security solution that is built into the development environment and process, producing highly accurate and easy-to-understand results.

    利用嵌在开发环境过程中的安全解决方案十分便利的方法,从而产生了高度精确容易理解的结果。

    youdao

  • Along with the column's usual focus on server-pertinent security and development issues, look for at least one more installment this spring on technologies for hosting legacy applications.

    除了查阅本专栏通常关注服务器方面的安全性开发问题还请查看这个春季发布的有关主管的应用程序技术专栏文章(至少以上)。

    youdao

  • However, this strength can open the door for poorly configured systems that don't support future expansion, changing development standards and protocols, and robust security.

    然而这个优点可能使配置糟糕系统泛滥成灾,这样的系统支持将来扩展不断变化开发标准协议以及可靠的安全性

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • Actions that are taken by developers and designers during development that are crucial to security but may be difficult to detect as part of the deployment process.

    开发人员设计人员部署期间所采取安全性至关紧要操作但是这些操作难以作为部署流程的一部分进行检验

    youdao

  • The first stage in solving the security problem starts with the development and design stage.

    解决安全问题一步始于开发设计阶段

    youdao

  • In general there is no such thing as plug-n-play security. Security depends on the people using the framework, and sometimes on the development method.

    一般没有这种即插即用安全,安全依赖于正在使用框架有时候也依赖于开发方式

    youdao

  • In the following tables, these practices have been grouped into four different categories: Design, Security, Development and Infrastructure.

    在下中,这些实践分成4个不同类别设计安全性开发基础架构

    youdao

  • In the following tables, these practices have been grouped into four different categories: Design, Security, Development and Infrastructure.

    在下中,这些实践分成4个不同类别设计安全性开发基础架构

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定