Engaging in other ACTS of disturbing the public security order.
其他扰乱治安秩序的行为。
The lateral analysis of public security order can be divided into such four scopes as concept, norms, organization and behavior.
对治安秩序进行横向解剖,它是由治安秩序的观念层面、规范层面、组织层面和行为层面等四个方面构成的。
The situation of public security order is reflected due to the interaction of the damage and control occurring at the specified time and space.
现实的治安秩序状况就是治安秩序的破坏力和控制力在一定时空点上相互作用的表现情态。
The specified time and space point is the carrier of public security order, the damage is the most active factor, the control strength is decisive factor.
一定时空点是治安秩序的载体,破坏力是治安秩序构成要素中最活跃的因素,控制力是治安秩序构成要素中决定性因素。
Under new regional security order and framework, traditional security remains room for non-traditional security, and provides the special external affection and basic.
在新的地区安全秩序和格局下,传统安全为非传统安全余留了空间,为其探索新的模式提供了特殊外部作用基础。
In order to maintain the social security order, strike crimes, protect the people's life property safety and other legal right, the police power has necessity to exist.
为了维护社会治安秩序,打击犯罪,保护人民的生命财产安全及其他合法权益,警察权有其存在的必然性。
Article 3 the legal representatives and the main principals of entertainment venues are the first persons responsible for maintaining the public security order of their venues.
第三条娱乐场所法定代表人、主要负责人是维护本场所治安秩序的第一责任人。
The ideas of order, security, family, religion and country had the same resonance for them as for Michael.
秩序、安全、家庭、宗教和国家这些概念在他们心里产生了和迈克尔一样的共鸣。
Security forces are allowed to use what's called "necessary force" to maintain order and can search people and premises without a warrant.
安保部队被允许使用所谓的“必要武力”来维持秩序,他们可以在没有搜查令的情况下搜查人员和房屋。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the FBI access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的,强迫苹果公司编写软件来让联邦调查局访问某 iPhone的指令,将树立起一个令人不安的先例。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the F.B.I. access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的那样,强迫苹果公司编写软件来让联邦调查局访问某iPhone 的指令,将树立起一个令人不安的先例。
Security guards at the Xilai Ranch maintain order at the cricket-fighting tournament.
西来农庄的保安人员,他们负责维持蟋蟀比赛的现场秩序。
Meanwhile, Chilean security forces are attempting to maintain order and prevent looting, while also distributing food and water and assisting in search and recovery efforts.
与此同时,智利安全部队正在努力维持秩序、以免发生抢劫行为,他们同时还在分发食品和水,并且帮助进行搜救和安抚工作。
He insisted that a security plan developed with the public order ministry, despite delays, will ' 'provide the highest protection and security "for all transit."
他坚称,会同公共秩序部制定形成的安全计划尽管一再拖延,但对所有的交通运输系统将“提供最好的保护和安全。”
However, the two sides share many common or similar views on the concept of international order and global security.
但双方在国际秩序观、安全观上都有着许多相同或相似的看法。
Security labels are applied to data in order to protect the data.
安全标签被应用到数据上,以保护该数据。
The DOP provides that Israel will retain responsibility during the transitional period for external and internal security and for public order of settlements and Israeli citizens.
计划还规定在维护以色列内外安全和公民公共秩序方面保留责任。
This is basically all that is needed to be done in order to set up the security.
这基本上是建立安全性所需的所有内容。
Later in the series, you will see how to configure Acegi to apply security filters in a specific order, thus creating a chain of filters.
在本文后面的部分,您将看到如何对Acegi进行配置,从而按照特定的顺序应用安全过滤器,因此需要创建过滤器链。
You can edit the agent.conf files to configure the order in which the security server is chosen.
您可以编辑agent.conf文件,以配置选择安全服务器的次序。
In order to keep this discussion focused, let me ignore all security aspects.
为了保持此次讨论的重点,请让我忽视所有安全方面的内容。
The philosopher stressed that good order is the basis of prosperity and security.
这位哲学家强调,良好的秩序应建立在繁荣和安定之上。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
CGBS is required if you run the secure proxy server in medium security mode in order to dynamically obtain routing information.
如果为了动态获得路由信息而在中级安全模式下运行安全代理服务器,那么需要使用CGBS。
It can respond automatically and work around problems, security threats, and system failures in order to be self-healing.
可以自动响应并围绕着问题、安全威胁以及系统故障而工作,以实现自修复。
When Yasser Arafat returned to Gaza in 1994 to set up the Palestinian Authority, he brought a sense of order, security and hope.
当1994年亚西尔·阿拉法特回到加沙成立巴勒斯坦民族权力机构时,他带来了一种秩序、安全和希望的感觉。
Nonetheless, we will briefly justify security in order to introduce some common ways of thinking about it.
尽管如此,为了引入一些理解安全性的常用方法,我们仍将简要介绍一下安全性。
Nonetheless, we will briefly justify security in order to introduce some common ways of thinking about it.
尽管如此,为了引入一些理解安全性的常用方法,我们仍将简要介绍一下安全性。
应用推荐