• Meanwhile security procedure whose relevant norms allocates the losses arising out of fraud among the parties serves as the authentication means of payment order.

    安全程序支付命令认证手段相关规则欺诈损失各当事方进行了分担。

    youdao

  • The rail tickets remind passengers to be onboard a mere two minutes before departure, and the only security procedure involves passing large suitcases though a scanner.

    火车票上的注意事项提醒乘客检票将在发车2分钟停止;唯一可以称得上安检的,就是要对大件行李进行扫描。

    youdao

  • As the most advanced law regulating large value electronic fund transfer, Article 4a of Uniform Commercial Code creates some new concepts and norms, say, "payment order", "security procedure".

    作为世界上调整大额电子资金划拨完善的法律,美国《统一商法典第4A编创设了“支付命令”和“安全程序”全新概念规则。

    youdao

  • Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.

    当然可以通过良好密码策略执行验证程序公司配备适当安全级别

    youdao

  • The procedure for enabling security on you test server will vary depending upon the particular user registry you choose to use.

    测试服务器启用安全性过程选择使用特定用户注册中心

    youdao

  • Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • Users of NFS may now conduct secure transactions using a remote procedure call (RPC) implementation of the General Security Service (GSS) API.

    使用通用安全服务 (General Security Service,GSS)API远程过程调用 (remote procedure call,RPC)实现NFS用户现在可以进行安全事务处理

    youdao

  • This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.

    这里详细介绍SET基本概念、所使用的主要技术以及运行过程同时分析了SET是怎样解决网上交易安全性的。

    youdao

  • In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.

    同时该系统采用相关网络安全技术保证执行任务过程信息交互安全性

    youdao

  • Is there an established procedure to conduct unannounced security checks periodically for all areas of concern?

    是否相关制度,所有重点区域是否定期进行突击安全检查

    youdao

  • Confirmation as a process from evidence to conclusion, the procedure should have strict legal and logical security.

    认证作为证据结论的确认过程程序应有着严格法律逻辑上保障

    youdao

  • Does the facility have procedure and training for employees to recognize and report any potential security threat?

    工厂是否培训所有员工的程序,使他们识别报告一切潜在的安全隐患?

    youdao

  • Adding procedure of investigation in the Penalty Law of Public Security Management is of realistic inevitability.

    治安管理处罚法调查程序增设,具有现实必然性

    youdao

  • Connects partially completes after the multichannel working procedure manufacture, stability good, reliability strong, the security is high.

    连接部分多道工序制作完成稳定性牢固性安全性

    youdao

  • The goal of police tactics is to guarantee the safety of law enforcement, including security awareness and procedure awareness.

    警务战术目标就是为了实现执法安全包括执法安全意识警务程序意识两方面。

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点可能攻击,提出了公钥加密协议的改进方法。

    youdao

  • Is there a procedure for in-country carriers to report in-transit security violations to the facility management?

    是否相关程序规定国内运输商如何向企业管理层汇报运输过程中违反安全规定的情况?

    youdao

  • In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.

    本文分析IMS认证密钥分配协议过程,找出认证协议中的安全缺陷,给出了攻击者可能进行的攻击。

    youdao

  • In this paper, a structure of application layer security system for CIMS network is proposed, the security mechanism and the service procedure of the system is developed in detail.

    本文提出一种CIMS网络应用层安全系统结构框架,并详细介绍系统安全机制服务过程

    youdao

  • Now, used SSL VPN, the security feature has already had the change, the people may through the browser visit application procedure.

    现在使用SSLVPN安全特性已经发生改变人们可以通过浏览器访问应用程序。

    youdao

  • From 1998 to 2011, Sylvia was a full-time lecturer with Temasek Polytechnic where she taught and researched civil and criminal procedure, criminal justice and private security.

    1998年至2011年,瑞莲马锡理工学院担任全职讲师研究并教授民事刑事诉讼程序、刑事司法私人保安。

    youdao

  • We, the undersigned, strongly urge you to speak out and vote against any motion or procedure to grant Japan the status as a permanent member of the United Nations Security Council.

    我们下列签署人极力主张阁下明确发言投票反对日本成为联合国安全理事会常任理事国任何议案程序

    youdao

  • The security feature of DHAAD(Dynamic Home Agent Address Discovery) procedure was analyzed, and a solution was proposed to protect it.

    分析动态家乡代理地址发现过程安全特性提出了一个对此过程进行安全保护方案

    youdao

  • Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.

    DSP系统常规的开发过程基础结合汽车智能主动安全系统中的计算机视觉动态图像处理总结了一套行之有效的DSP软硬件系统的开发、调试过程

    youdao

  • Is there a procedure for reporting of potential security issues observed by employees?

    工厂是否雇员如何上报发现潜在安全隐患渠道或程序?。

    youdao

  • At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.

    首先信息安全风险评估流程入手着重叙述信息安全风险评估过程风险计算原理步骤

    youdao

  • The encryption and decryption procedure of PGP is studied in detail and its security is briefly presented. Finally, the way to use PGP in common Email software to protect Email is analysed.

    首先介绍了互联网上加密电子邮件软件——PGP具体分析PGP加、解密电子邮件的详细过程简单讨论了PGP的安全性能,最后分析了目前最常用的电子邮件上的PGP加密功能。

    youdao

  • The encryption and decryption procedure of PGP is studied in detail and its security is briefly presented. Finally, the way to use PGP in common Email software to protect Email is analysed.

    首先介绍了互联网上加密电子邮件软件——PGP具体分析PGP加、解密电子邮件的详细过程简单讨论了PGP的安全性能,最后分析了目前最常用的电子邮件上的PGP加密功能。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定