It can be hard to identify which parcels are carrying crucial items such as Social Security checks, but USPS and UPS try their best to prioritize sensitive material.
虽然很难辨别哪些包裹里装的是社会保障支票等重要物品,但美国邮政(USPS)和联合包裹服务公司(UPS)会尽其所能优先处理敏感材料。
Identify whether it security can be implemented in all application tiers.
确认IT安全是否可以在所有应用程序层实现?
Identify issues to Teams that they might overlook, such as scalability, performance, security, etc.
识别出团队可能忽略的问题,比如可伸缩性、性能、安全性等等。
Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.
安全专家正在部署一个新的全球系统,该系统能鉴定互联网地址,使网站伪造或欺骗变得更加困难。
Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.
安全专家正在部署一个新的全球系统,该系统能鉴定互联网地址,使网站伪造或欺骗变得更加困难。
For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.
例如,实现人员可以从每个请求中的安全性上下文里检索请求者的用户ID,使用它来确定目标计算器总数。
There's actually an international standard that you can use to formally identify security requirements and determine if they are met.
事实上您可以使用一个国际标准来正式确定安全性需求并确定它们是否满足要求。
The Guardian reported earlier this month that former SAS soldiers and other western employees of private security companies are helping Nato identify targets in the Libyan port city of Misrata.
卫报在本月早些时候称前SAS士兵和一些私营保安公司的西方雇员帮助北约识别利比亚港口城市米苏拉的目标。
Identify your security requirements.
确定您的安全性需求。
Identify your security environment.
确定您的安全性环境。
Once you know your program's security objectives, you can identify the security requirements by filling in more detail.
一旦知道了程序的安全性目标,就可以通过更详细地填充其内容来确定安全性需求。
Identify your security objectives.
确定您的安全性目标。
This information is used to help identify potential security "holes" that may be weak points for attacks against customers.
这些信息用于帮助发现潜在的安全“漏洞”,此类弱点可能被利用向客户发起攻击。
Usually, as you identify your security objectives, you'll find that there are some things your program just can't do on its own.
通常,在您确定了安全性目标时,您的程序单靠自己还不能完成某些事情。
The primary security duty of a requirements specifier is to identify at a high level the core security model for the application.
对需求最主要的安全责任是为应用程序定义一个高水平的核心安全模型。
This approach interacts with a running instance of the application, effectively attempting to perform light hacks (mostly harmless) to identify security holes.
这种方法与这个应用程序的运行实例相互影响,从而有效地执行轻度攻击(绝大多数是无害的)来检查安全漏洞。
Passengers will have to drink bottled water and other beverages they carry into the subway if security machines and police dogs could not identify them.
乘客随身携带的瓶装水等饮料,若无法被识别,需当场饮用后才可通过。
Security officials with the Israeli airline el al already spend a long time questioning passengers in order to identify behavioural traits that mark them out as dangerous.
以色列航空公司ElAl的安全官员为了识别出让他们显得危险的行为特征,他们已经花了好长时间询问乘客。
You need to do this because the WS-Security specification allows attaching multiple tokens for authentication, thus additional metadata is required to identify which is the primary security token.
这样做的原因是因为WS - Security规范允许为身份验证附加多个令牌,这样就需要更多的元数据来识别哪一个是主安全令牌。
An example of this pattern would be to identify all variables that are declared public and flag them as potential security problems.
该模式的一种范例是识别所有声明为public的变量,并将它们标记为安全性问题。
The Isolator USES a control field in the input to identify the customer tenant and applies the relevant security and partition logic to store in the correct place.
Isolator在输入中指定一个控制域来确定使用客户,并应用相关的安全性和分区逻辑将它存储到正确的位置。
Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.
支持组织识别和验证用户一次,然后跨多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性并降低风险。
Once you know what your environment is, you can identify your security objectives, which are basically high-level requirements. Typical security objectives cover areas such as.
一旦您知道了身处什么环境;就可以确定您的安全性目标,它们基本上是高级需求。
ArcSight, a maker of software that is used to identify suspicious activity on a corporate network, may help HP better incorporate security features into other products.
ArcSight是一家生产鉴别公司网络可疑行为的软件生产商,将会有助于惠普更好的将安全特性整合到其他产品中。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
As an acknowledgement of the importance of security, we provide an "Identify security Patterns" task that ensures the level of security required by the system.
为了认识到安全重要性,我们提供了一个“Identify SecurityPatterns”任务,它可以保证系统所需要的安全级别。
Such ploys can make it hard to identify exactly who is behind a particular online assault, says Adam Vincent of Cyber Squared, another security firm.
来自另一家网络安全公司CyberSquared的AdamVincent说,这样(僵尸网络的)形式的攻击真的很难定位到某次入侵的幕后真凶是谁。
Such ploys can make it hard to identify exactly who is behind a particular online assault, says Adam Vincent of Cyber Squared, another security firm.
来自另一家网络安全公司CyberSquared的AdamVincent说,这样(僵尸网络的)形式的攻击真的很难定位到某次入侵的幕后真凶是谁。
应用推荐