Engaging in other ACTS of disturbing the public security order.
其他扰乱治安秩序的行为。
The lateral analysis of public security order can be divided into such four scopes as concept, norms, organization and behavior.
对治安秩序进行横向解剖,它是由治安秩序的观念层面、规范层面、组织层面和行为层面等四个方面构成的。
The situation of public security order is reflected due to the interaction of the damage and control occurring at the specified time and space.
现实的治安秩序状况就是治安秩序的破坏力和控制力在一定时空点上相互作用的表现情态。
The specified time and space point is the carrier of public security order, the damage is the most active factor, the control strength is decisive factor.
一定时空点是治安秩序的载体,破坏力是治安秩序构成要素中最活跃的因素,控制力是治安秩序构成要素中决定性因素。
Under new regional security order and framework, traditional security remains room for non-traditional security, and provides the special external affection and basic.
在新的地区安全秩序和格局下,传统安全为非传统安全余留了空间,为其探索新的模式提供了特殊外部作用基础。
In order to maintain the social security order, strike crimes, protect the people's life property safety and other legal right, the police power has necessity to exist.
为了维护社会治安秩序,打击犯罪,保护人民的生命财产安全及其他合法权益,警察权有其存在的必然性。
The ideas of order, security, family, religion and country had the same resonance for them as for Michael.
秩序、安全、家庭、宗教和国家这些概念在他们心里产生了和迈克尔一样的共鸣。
Security forces are allowed to use what's called "necessary force" to maintain order and can search people and premises without a warrant.
安保部队被允许使用所谓的“必要武力”来维持秩序,他们可以在没有搜查令的情况下搜查人员和房屋。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the FBI access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的,强迫苹果公司编写软件来让联邦调查局访问某 iPhone的指令,将树立起一个令人不安的先例。
As Apple and several security experts have argued, an order compelling Apple to write software that gives the F.B.I. access to the iPhone in question would establish an unsettling precedent.
正如苹果公司和几位安全专家所主张的那样,强迫苹果公司编写软件来让联邦调查局访问某iPhone 的指令,将树立起一个令人不安的先例。
Because without such an international order, the forces of instability and disorder will undermine global security.
因为,如果没有这样的国际秩序,不稳定和混乱力量就会破坏全球安全。
Security guards at the Xilai Ranch maintain order at the cricket-fighting tournament.
西来农庄的保安人员,他们负责维持蟋蟀比赛的现场秩序。
Meanwhile, Chilean security forces are attempting to maintain order and prevent looting, while also distributing food and water and assisting in search and recovery efforts.
与此同时,智利安全部队正在努力维持秩序、以免发生抢劫行为,他们同时还在分发食品和水,并且帮助进行搜救和安抚工作。
He insisted that a security plan developed with the public order ministry, despite delays, will ' 'provide the highest protection and security "for all transit."
他坚称,会同公共秩序部制定形成的安全计划尽管一再拖延,但对所有的交通运输系统将“提供最好的保护和安全。”
However, the two sides share many common or similar views on the concept of international order and global security.
但双方在国际秩序观、安全观上都有着许多相同或相似的看法。
We are considering setting up a nuclear security "Center of Excellence" in China through cooperation with relevant countries in order to play a bigger role in regional nuclear security cooperation.
中国正积极考虑同有关国家合作,在华建立核安全示范中心,在地区核安全合作方面进一步发挥作用。
The DOP provides that Israel will retain responsibility during the transitional period for external and internal security and for public order of settlements and Israeli citizens.
计划还规定在维护以色列内外安全和公民公共秩序方面保留责任。
This is basically all that is needed to be done in order to set up the security.
这基本上是建立安全性所需的所有内容。
Later in the series, you will see how to configure Acegi to apply security filters in a specific order, thus creating a chain of filters.
在本文后面的部分,您将看到如何对Acegi进行配置,从而按照特定的顺序应用安全过滤器,因此需要创建过滤器链。
You can edit the agent.conf files to configure the order in which the security server is chosen.
您可以编辑agent.conf文件,以配置选择安全服务器的次序。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
CGBS is required if you run the secure proxy server in medium security mode in order to dynamically obtain routing information.
如果为了动态获得路由信息而在中级安全模式下运行安全代理服务器,那么需要使用CGBS。
It can respond automatically and work around problems, security threats, and system failures in order to be self-healing.
可以自动响应并围绕着问题、安全威胁以及系统故障而工作,以实现自修复。
When Yasser Arafat returned to Gaza in 1994 to set up the Palestinian Authority, he brought a sense of order, security and hope.
当1994年亚西尔·阿拉法特回到加沙成立巴勒斯坦民族权力机构时,他带来了一种秩序、安全和希望的感觉。
The container uses the proxy to wrap the actual endpoint in order to provide services such as transactions and security.
容器使用代理来包装实际的端点,以便提供事务和安全性这样的服务。
Nonetheless, we will briefly justify security in order to introduce some common ways of thinking about it.
尽管如此,为了引入一些理解安全性的常用方法,我们仍将简要介绍一下安全性。
Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.
但是,架构师需要了解物理层以避免网络瓶颈和安全暴露。
Administrative and application security both need to be enabled in order for security roles be enforced.
为强制实施安全性,需要同时启用管理和应用程序安全性。
Administrative and application security both need to be enabled in order for security roles be enforced.
为强制实施安全性,需要同时启用管理和应用程序安全性。
应用推荐