Do not use explicit members as a security boundary.
不要将明确成员当做安全性界限来使用。
This paper proposes a fine-grained radio-map localization based information security boundary in sensor network.
提出一种利用传感器网络精细电子地图定位建立信息安全边界的方法。
The security boundary of China has already remarkably expanded, and it is no longer limited to the traditional territory margin for safety.
中国的安全边界在今天已经显著扩大,不再局限于传统的领土安全范围。
A case study of the Olympics security system and related products, boundary surveillance system, smart soldier system and more will highlight the public security sector.
奥运会安保系统和相关产品的案例研究、边境监视系统、智能士兵系统和更多内容将在公共安全板块亮相。
Businesses must always strike a balance between conformance and performance — with security concerns providing boundary conditions.
企业必须总是在一致性与性能之间权衡利弊——并且让安全性提供边界条件。
Moreover, according to the relative distance between the operating point and the boundary of DSR, the index of security margin and security transition probabilities can be determined.
依据运行点距动态安全域边界的距离,还可以确定系统的安全裕度和安全转移概率等安全性指标。
This paper introduced that the structure, testing principle and boundary design of the system software for test system of the performance core of security valve.
介绍了安全阀铁心磁性能测试系统的结构、测量原理。系统软件界面设计。
The structure, testing principle and boundary design of the system software for test system of the performance core of security valve are introduced in this paper.
介绍了安全阀铁心磁性能测试系统的结构、测量原理、系统软件界面设计。
Never use read-only public array fields from managed libraries to define the boundary behavior or security of your applications because read-only public array fields can be modified.
一定不要使用托管库的公共只读数组字段来定义应用程序的边界行为或安全性,因为公共只读数组字段可以被修改。
Considered from the data security Angle, this system establishes log-in boundary plane for each sale to realize the identification.
从数据安全角度考虑,本系统对各个销售点都设置了登录界面以实现身份验证。
Considered from the data security Angle, this system establishes log-in boundary plane for each sale to realize the identification.
从数据安全角度考虑,本系统对各个销售点都设置了登录界面以实现身份验证。
应用推荐