The two vendors, while technically acknowledging the problem, dismissed it as a non-security issue.
这两个供应商,都从技术上承认了这个问题,却将它解散成一个非安全性问题。
This system is applied in not only PSTN but also non-security system based on circuit switched networks.
该系统不仅可用于PSTN,也可用于其它和PSTN类似的基于电路交换和网络本身没有保密的系统。
Domestic non-security, non-entitlement spending accounts for less than 15 percent of federal expenditures.
国内非安全性支出和非权益性开支占联邦支出的不到百分之15。
Finally, the budget plans to find $400 billion of savings in “non-security discretionary” spending over the next ten years.
最后,该预算计划在“非安全无条件”支出方面在今后10年减少4000亿美元。
If the U. S. can take non-Security-Council authorized PREemptive or PREventive military action, then other countries can as well.
如果美国在安理会授权的情况下可以采取先发制人的或者预防性的军事行动,那么其他国家也同样可以。
Through division of constraint conditions of units into security operation zone and non-security operation zone, a new model for internal economic operation is proposed.
通过划分机组的约束限制条件为安全运行区和非安全运行区,提出了一种基于开关控制策略的厂内经济运行模型。
If you need to secure a virtual cube, you need to define security on the non-virtual cubes on which the virtual cube is based.
如果需要保护一个虚拟多维数据集,需要在虚拟多维数据集所基于的非虚拟多维数据集上定义安全性。
This can solve configuration problems that occur due to non-existing security namespaces and broken links to packages and old report content lying in the content Store.
这样能够解决由于不存在安全名称空间,以及损坏到连接包的链接和ContentStore中旧报告内容所引起的配置问题。
In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied.
特别是在企业间的商业交易中,不可抵赖性的安全性要求需要得到满足。
You can define security on the measures dimension in addition to a non-measures dimension.
除了非度量维度之外,您还可以在度量维度上定义安全性。
Livestock contribute directly to livelihoods worldwide, providing not only food, but also non-food products, draught power and financial security.
畜牧业不仅为全球提供食品,还提供非食用产品、畜力和金融安全,直接有助于提高民生。
They also agreed to resume and expand consultations on non-proliferation and other international security topics.
双方还同意恢复和扩大在防扩散和其他国际安全问题上的磋商。
In most cases, enabling security features requires a non-technical user to read manuals written for the technologist.
在大多数情况下,启用安全特性需要非技术用户阅读为专家编写的用户手册。
It also covers the essential non-functional requirements like security, scalability, standards, and fault tolerance.
它还能够满足安全性、可伸缩性、标准和容错等基本的非功能性需求。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
Austria, Japan, Mexico, Turkey and Uganda have won non-permanent seats on the U.N. Security Council.
奥地利、日本、墨西哥、土耳其和乌干达赢得联合国安理会非常任理事国席位。
In addition to the above two security requirements, non-repudiation is an important requirement in B2B applications as well.
除了以上两项安全性要求以外,不可抵赖性也是B2B应用中相当重要的一个要求。
As mentioned above, the aim of disarmament, arms control and non-proliferation is to promote peace and security for all countries, big or small, strong or weak.
如前所述,裁军、军控和防扩散的目的是为增进各国和平与安全。各国,包括大国、强国,更包括小国、弱国。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
Some Asian countries are squeamish about the effect of non-traditional security on their sovereignty. They should swallow hard.
某些亚洲国家在非传统安全对其主权所产生影响方面多有顾忌,它们应当努力接受新观念。
Then, users could navigate between secured and non-secured pages without breaking the security model.
然后,用户可以在安全页面和不安全页面之间导航而不会破坏安全模型。
Counter non-traditional security threats through coordination and cooperation.
——团结协作,共同应对非传统安全威胁。
Workaround: Ensure that you are using valid, non-expired security certificates issued by a trusted root certification authority.
处理:确保您在使用由可信任的根证书颁发机构颁发的有效的、非过期的安全证书。
Steps for enabling security are included, but the scenario can be run without security in non-production environments.
场景中包括启用安全性的步骤,但也可以在非生产环境中以不启用安全性的方式运行。
As non-permanent members of the Security Council, aspiring medium-sized powers Turkey and Brazil have no veto.
作为安理会的非常任理事国,立志成为中等大国的土耳其和巴西没有否决权。
Third, China takes the opportunity of the Joint Decalaration on Cooperation in Non-traditional Security Field and lauches China-ASEAN cooperation in non-traditional security field.
三是以发表《关于非传统安全领域合作联合宣言》为契机,启动了我与东盟在非传统安全领域的全面合作。
For example, security and other non-functional requirements are end-to-end notions that will affect quality of service of your SOA.
例如,安全和其他非功能的需求是将影响SOA的服务质量的点到点的概念。
For example, security and other non-functional requirements are end-to-end notions that will affect quality of service of your SOA.
例如,安全和其他非功能的需求是将影响SOA的服务质量的点到点的概念。
应用推荐