Veterans, high school degree or above. with two or more years working experience in security or guard.
退伍军人,高中或高中以上学历。具有两年或两年以上保安或门卫的工作经验。
You've also done security for Sacha Baron Cohen. Is he in character or out?
你还负责了萨夏男爵科恩的安全。他是否与他身份相符呢?
Demanding too much of air travelers or providing too little security in return undermines public support for the process.
如果对飞机乘客的要求过于苛刻,或者相应的安全保障太少,反而会削弱民众对安检的支持。
But demanding too much of air travelers or providing too little security in return undermines public support for the process.
可是,如果对飞机乘客的要求过于苛刻,或者相应的安全保障太少,反过来就不利于民众对安检的支持。
If you want to add security or make other deployment descriptor changes in the exported application EAR, then use the AAT tool.
如果您希望添加安全性或对导出的应用程序EAR中的其它部署描述符进行修改,请使用AAT工具。
It provides a way to safely communicate between applications or security contexts in the same process.
它提供了同一进程中的应用程序或安全上下文之间安全通信的方法。
Unlike many security agencies or entities in the human world, the most adaptable and successful organisms avoid centralization.
不同于人类世界中许多安全机构或实体,适应性最强最成功的生物体往往避免集中化。
These data could be consulted by browsers or third-party plugins to sniff out unusual changes in security documents and warn users—or simply prevent a connection.
这些数据可以通过浏览器或第三方插件进行咨询来嗅出安全文件里不一般的变化并警告用户---或完全地阻止连接。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
If the online bookstore offers online payment, customers of the bookstore won't be happy if you deliver the software without security in place, or with an ever changing user interface.
如果在线书店提供在线支付,要是你交付的软件缺乏适当的安全性或是经常变动用户界面,书店的顾客就会不满意。
They could also act as a security system or provide Internet connectivity to other things in the building.
它们还可作为安全系统或者为建筑物里的其它事物提供互联网连接。
In this article, we'll mainly focus on the security challenges and solutions currently available or in development for MIDP applications.
在本文中,我们主要集中讨论MIDP应用程序的安全性挑战以及当前可用的或处于开发中的解决方案。
Even with such measures in place, though, any server is a potential security risk: The software could have undiscovered bugs or be misconfigured in some way.
即使采用了这类措施,任何服务器仍然存在潜在的安全威胁:软件可能存在问题,或者配置方式可能出错。
Fewer and fewer of your citizens have access to affordable housing, healthcare or security in retirement.
能够负担得起住房,医疗保健或退休生活保障的公民越来越少。
Monitoring of the client status can focus on, for example, checking the remaining disk space, the security status, or licensing issues in the context of asset management.
例如,对客户机状态的监视可以主要关注剩余磁盘空间、安全状态或资产管理方面的许可证问题。
Security for data while in transit or in storage is a very important part of the discussion.
在传输或存储时的数据安全是讨论中一个非常重要的部分。
Iran can be the most potent threat to our global security in 2011 or it can become a responsible and respected player on the international stage.
伊朗有可能成为2011年全球安全的最大潜在威胁,也有可能成为国际舞台上负责与受人尊敬的选手。
In most content or access implementations, security is set in a binary fashion — users either see the content or they don't.
在大多数内容或访问实现中,安全性是以二进制的方式设置的——用户要么能够看到内容要么不能看到内容。
The Grug as he styles himself is a leading security expert specialising in Internet telephony or VOIP as it is often called.
格拉格把自己称作因特网电话方面——或者经常被简称为VOIP方面的顶级安全专家。
Figure 1 shows this concept, with opportunities to hook in events to handle security aspects, or a particular HTTP method (such as GET or POST) event.
图1展示了这个概念,并且还包括了处理安全性方面问题的事件和特定的HTTP方法(比如GET或POST)事件。
Current users of NFS looking for improved performance or security will gain in both areas by migrating to version 4.
NFS用户迁移至版本4就可以得到期待中的提高的性能与安全。
In the Security Token dialog, enter or select the following values (Figure 4).
在SecurityToken对话框中,请输入或选择下列值(图4)。
In these cases, WS-Security (or its offspring, WS-SecureConversation) is required, and the performance cost is simply a necessary expense.
在这些情况中,就必须使用WS - Security(或者它的后代WS - SecureConversation),而且性能成本也成为必要的开销。
To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.
为了确保最佳性能,memcached 并未提供任何形式的安全性,没有身份验证,也没有加密。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
These additional flags open up a management port and configure security Settings (or the lack thereof, in this case).
这几个标志打开一个管理端口并配置安全设置(或本例中的lack there of)。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
The examples in this section will focus on an environment without administrative or application security enabled.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
The examples in this section will focus on an environment without administrative or application security enabled.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
应用推荐