Security Studies Scholars should own a copy.
所有安全研究学者都应该拥有一本。
The domestic water security studies cannot take the place of the international water issues study.
国内水安全的研究不能取代国际水问题探讨。
Scholars from various backgrounds got involved in the security studies from different perspectives.
理论背景各异的学者们也开始从各自不同的视角出发,着手研究安全问题。
Paul Kennedy is Dilworth professor of history and director of international security studies at Yale University.
保罗·肯尼迪:帝尔沃斯历史学教授,耶鲁大学国际安全研究负责人。
An analyst with South Africa's Institute for Security Studies, Judy Smith-Hohn, says as a result the campaign was short though heated.
南非安全问题研究所的分析员霍恩说,这场选战因此是短暂而激烈的。
Thanks to Paul Pillar, director of graduate studies at Georgetown University's Center for Peace and Security Studies and a former CIA intelligence officer.
在此特别感谢美国乔治敦大学和平及安全研究中心研究生院主任,中情局前情报员皮拉尔·保罗对本文的支持。
The signature scheme can verify the authenticity, integrity and undeniableness of a document, and signature scheme is the important content that information security studies.
签名计划可以用来验证身份的真实性、文档的完全性和不可否认性,是信息安全研讨的主要内容。
"Nuclear facilities in Japan... were built to withstand earthquakes — but not an 8.9 earthquake," said James Walsh, a CNN contributor and research associate at MIT's security studies program.
“日本的核设施……是为了经受地震而建的——但不是8.9级地震。”CNN供稿人及麻省理工学院安全研究项目副研究员JamesWalsh说。
Studies have shown that farmers in developing countries who have achieved certain levels of education, wealth, and security of land tenure are more likely to adopt such technologies.
研究表明,在发展中国家,拥有一定教育水平、财富和土地所有权保障的农民更有可能采用这类技术。
“The U.S. has been smart, ” said Carlyle A. Thayer, a professor at the Australian Defense Force Academy who studies security issues in Asia.
“美国已经变聪明了,”在澳大利亚国防大学研究亚洲安全问题的教授卡莱尔·塞耶说。
Studies on world food security estimate that an affluent diet containing meat requires up to 3 times as many resources as a vegetarian diet9.
一个世界食物安全的研究评估到:一个富含肉的饮食需要的资源是素食的3倍。
"Huawei has transparency problems" said James A.Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems," said James A. Lewis, a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems" said James A. Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
The problem, though, is "there's nothing that everyone agrees on," said James Lewis, cyber-security expert at the Center for Strategic and International Studies in Washington.
不过,这一问题“无法人人都能达成共识,”詹姆斯·刘易斯(James Lewis)如是说,他是总部位于华盛顿的“战略与国际研究中心”的网络安全专家。
The launch of the Common European Security and Defence Policy (CESDP) is a decisive measure in European integration which would provide a new field for studies on European integration.
共同安全与防务政策的启动是欧洲一体化进程中的一个突破性举措,欧洲一体化研究因此增加了一个新的视点。
This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.
本文讨论了嵌入式系统安全设计面临的挑战以及受到的攻击方式,探讨了如何弥合安全处理的资源缺陷和抵抗攻击的方法。
What this thesis studies is to protect the security mining method under the condition of thickness collapsible loss.
本文所研究的就是巨厚湿陷性黄土层条件下保护地表安全的开采方法。
This thesis primarily studies the construction of full-scale information security framework of the Agriculture Bank of China.
本论文从农业银行总行的角度来研究全国农业银行一级分行网络安全的建设。
Our studies are not merely a theoretical discussion. Whatsmore, they give some new perspective on funds operation, analysis and evaluation in China's security markets.
本文的研究不仅是一种理论上的探讨,更重要的是,它为中国证券市场上的基金运作、研究和评价引入了一种新的视角。
This dissertation studies how to build trust model for grid computing in order to find out malicious users and improve security and reliability of system.
本文研究如何在网格计算中建立信任模型,来排除内部恶意节点,提高系统的安全可靠程度。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on the research survey of the herd behavior in security markets, the author empirically studies the herd behavior in China stock market and theoretically analyzes the occurrence mechanism of it.
本文主要在对证券市场羊群行为研究现状进行综述的基础上,对中国股票市场上的羊群效应进行实证研究并对其发生机制进行理论分析。
The exercise "is designed to send China a message that Vietnam refuses to be pushed around, " said Ian Storey, a regional security analyst with the Institute of Southeast Asian Studies in Singapore.
伊恩。斯道瑞是新加坡东南亚研究学院的一位地区分析人士,他说,本次演习“旨在向中国发出一种信号,越南拒绝任人摆布。”
This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).
本文概述了目前的安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。
Recent studies indicate abroad, security from bike-helmet, seems to be too overrated.
最近国外有相关研究指出,安全帽带给骑士的安全保护,似乎被过于高估了。
This thesis analyses and studies the legal adjustment of security market internationalization according to the transverse and vertical comparison.
本文旨在通过对证券市场国际化的纵向与横向比较,对我国证券市场国际化的法律调整进行了分析和研究。
This thesis analyses and studies the legal adjustment of security market internationalization according to the transverse and vertical comparison.
本文旨在通过对证券市场国际化的纵向与横向比较,对我国证券市场国际化的法律调整进行了分析和研究。
应用推荐