PIN-controlled security helps prevent unauthorized access to your sensitive UPS delivery information.
由PIN控制的安全性帮助防止对您的敏感的UPS递送信息的未授权的访问。
Developers can add an extra layer of application and data-level security when critical data is controlled by their software.
当关键数据被其他软件控制的时候,开发人员可以添加额外的应用程序层和数据级安全。
Because the employees and roles of the partner organizations are controlled by the partner organization, it's best to keep the federated security model.
由于合作伙伴组织的员工和角色由合作伙伴组织控制,因此最好采用联合安全模型。
Individual countries can set their own security policy but minimum standards are controlled by the European Commission, a spokesperson for the UK's biggest airport operator, BAA, says.
英国最大机场运营商英国机场管理局的发言人表示,各个国家可设定自己的安全政策,但其最低标准将由欧盟控制。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
Any communication between the secure partitions is controlled by security policies defined by the system administrator and enforced by LynxSecure.
分区之间的任何通信都由系统管理员遵循安全政策进行控制,由LynxSecure执行。
The security controls deployed for LotusLive provide privacy and controlled authorization to sensitive information while enabling business operations.
为LotusLive部署的安全控件为敏感信息提供隐私和可控授权,同时支持业务操作。
Directory access is controlled by deploying GBeans that specify a security deployment plan on geronimo. Your application extends this deployment plan in the geronimo-web.xml.
通过部署GBeans而控制目录访问,GBeans指定Geronimo上的安全部署计划。
He then left the library, knowing that the computer that controlled the security door had recorded the time of his visit.
他随后即离开了图书馆,知道控制着安全门的电脑已经记录了他这次来访时间。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
Each role must be defined in the deployment descriptor of each Web or enterprise application, and security constraints must be created to secure each authorization-controlled resource.
必须在每个Web或企业应用程序的部署描述符中定义每个角色,并且必须创建安全约束来保护每个授权控制的资源。
Security should ensure that the entrance is controlled to allow only guests to enter during the critical period.
在紧急时刻,保安部应确保控制入口处只允许客人进入。
The principle of autosuggestion works in precisely the same manner when your dominating thought are fixed, through controlled attention, upon success and security.
如果你的主导思想是明确的、被关注的、成功并且安全的,那么自我暗示的原理也会以同样的方式发生作用。
With this feature the security of the entire network can be controlled and managed at one single point.
有了这项功能的安全,整个网络可以控制和管理,在一个单一的点。
In developed countries, youth unemployment can be efficiently controlled because active employment security measures have been taken to promote the youth to get employed.
发达国家之所以能够较为有效地控制青年失业率,主要是因为实施了积极的就业保障措施来促进青年就业。
This paper introduces controlled blasting technology on signal chamber of pit-bottom and main haulage roadway, which are of complex condition, lithological character and highly security.
介绍了采用控制爆破技术施工位于井底车场及主要运输大巷的信集闭峒室,条件复杂,岩性变化大,要求安全性高。
Some servers could support multiple levels of security, either for different functions controlled by the server, or to allow different capabilities to be exercised.
有些服务器可以支持多个安全标准,是由服务器控制的各个不用的功能或是允许可以实行的不同性能。
But in modern British life, children are more than ever being constantly watched and controlled, as people become more security conscious.
而如今现实生活中的英国,随着人们安全意识的增加,孩子们受到了严密的看管和控制。
Formerly controlled tenancies will continue to enjoy security of tenure so long as the tenant is prepared to pay the prevailing market rent on renewal of the tenancy.
对于过去受管制的租赁,只要租客于续订租赁时愿意缴付市值租金,其租住权将继续得到保障。
Is the issuance and removal of employee, visitor and vendor identification badges adequately controlled by security or authorized persons?
员工,访客和供应商识别卡的发放和回收是由保安或者相关授权人员统一控制的吗?
This authorization facility ensures that access to metadata resources is controlled centrally, easing the implementation of a corporate security strategy.
这项授权设施可确保对元数据资源的访问集中,控制纾缓公司安全战略的实施。
All doors, hatches, deck sensors, and exterior door buttons can be controlled from the security system touch screens.
所有的门、货仓、甲板传感器和户外门都可以由安全系统的触摸屏所控制。
Analysis and application results show that access to files in different environments can be effectively controlled without influence of normal use, thus this model can ensure the security of files.
经分析和应用表明,该模型能在不影响文件正常使用的基础上,使不同环境中的文件访问都能得到有效控制,从而保证文件的安全。
Fixed a security issue where memory corruption may occur when verifying the digital signatures. Attackers could exploit this vulnerability to execute a controlled crash.
固定验证数字签名时内存损坏可能发生的安全问题。攻击者可以利用此漏洞执行受控制的崩溃。
In computer security, a description of the characteristics of an entity to which access is controlled.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。
The principle of autosuggestion works in precisely the same manner when your dominating thoughts are fixed, through controlled attention, upon success and security.
如果你的主导思想是明确的、被关注的、成功的并且安全的,那么自我暗示的原理也会以同样的方式发生作用。
Strict security measures shall be established for the airport controlled area, and the area shall be of a closed type and controlled separately.
机场控制区应当有严密的安全保卫措施,实行封闭式分区管理。
Formerly controlled tenancies will continue to enjoy security of tenure so long as the tenant is prepared to pay the prevailing market rent on renewal of the tenancy.
本港所有出租住宅的租客,只要于租赁届满时愿意缴付市值租金,租住权都会继续受到保障。
Formerly controlled tenancies will continue to enjoy security of tenure so long as the tenant is prepared to pay the prevailing market rent on renewal of the tenancy.
本港所有出租住宅的租客,只要于租赁届满时愿意缴付市值租金,租住权都会继续受到保障。
应用推荐