States fail when national governments can no longer provide personal security, food security and basic social services such as education and health care.
当国家政府再也无法提供个人安全、粮食保障以及教育和医疗等基本社会服务时,国家就会衰落。
We should place equal emphasis on development and security, and develop nuclear energy on the base of security.
坚持发展与安全并重,在安全的基础上发展核能。
Government should attach great importance to cyber security which is constantly under attack and is of great importance to national security.
政府应该十分重视网络安全,它不断地受到攻击,却又对于国家安全十分重要。
They will coordinate with the Social Security Administration to make sure that Social Security checks reach the right people in a timely fashion.
他们将与社会保障局协调,确保社会保障支票及时到达正确的人手中。
In fact, one of the real problems with security is that security requirements vary from program to program and from circumstance to circumstance.
事实上,有关安全性的实际问题之一是安全性需求会根据不同的程序和不同的环境而迥然不同。
A security label belongs to a security policy and contains a value for each security component in that security policy.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
Transport-level security means that security mechanisms are achieved with methods that the transport provides.
传输级安全性意味着安全机制是通过传输所提供的方法获得的。
Set the security officer PIN: Prudent management practice will have the security officer change the security officer PIN immediately after initializing the token.
设置安全性主管PIN:谨慎的管理实践是让安全性主管在初始化令牌之后立即更改安全性主管PIN。
The server's security system validates the user against its security registry and obtains other security information about the user.
服务器的安全系统将针对安全注册中心对用户进行验证并获得关于用户的安全信息。
Security is indivisible, which effectively means there cannot be security for some without security for all.
安全是不可分割的,也就是说,如果没有所有国家的安全,便不会有部分国家的安全。
The authors then offer an example of security violation, using a traditional analogy that likens software security to home security.
作者接下来提出了关于违反安全的一个例子,使用传统的推理把软件安全比作成家庭安全。
The administrative agent and job manager support two different basic security configurations: same security domain and different security domains.
管理代理和作业管理器支持两种不同的基本安全配置:相同安全域和不同安全域。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
This information includes the principal's identities, public security credentials, and private security credentials.
该信息包含主体的身份、公共的安全凭证和私有的安全凭证。
Both solutions provide message-level security, incorporating security features in the SOAP message and working in the application layer, thus ensuring end-to-end security.
这两个解决方案都提供了消息级别的安全性,将安全功能合并到SOAP消息中并作用于应用层,因此保证了端到端的安全。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
After creating a security policy, the security administrator creates security labels that are part of that policy.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
However, as more security is needed, new security policies can be created to restrict viewing.
然而,随着安全需求的增加,就会创建新安全策略来限制查看。
The default behavior for EJB security when global security is turned on has changed.
当全局安全性开启时用于ejb安全性的缺省行为已经被改变了。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
The internal security apparatus includes the Ministry of Public security (MPS) and the State security Department (SSD).
内部安全保卫机构,包括公共安全部(MPS)和国家安全部(SSD)。
Here, the "SOA security cloud" represents all security services meeting all SOA security requirements.
这里的“SOA安全集合”代表满足所有 SOA 安全需求的所有安全服务。
Security: Auto login, timed login, security.
安全:自动登录,限时登录,安全。
In general there is no such thing as plug-n-play security. Security depends on the people using the framework, and sometimes on the development method.
一般没有这种即插即用的安全,安全依赖于正在使用的框架,有时候也依赖于开发方式。
To keep up to date subscribe to security mailing lists, read security blogs and make updating and security checks a habit (check the Additional Resources chapter).
要不断更新订阅的安全邮件列表,请阅读安全博客,并更新和安全检查的习惯。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
The EJB Visual Editor now enables the application assembler to visually create security roles and link the Security Role Reference to the security roles.
EJB可视化编辑器现在已经可以允许应用程序的组装人员直观地创建安全性角色,并能够将安全性角色引用链接到安全性角色。
Improved security allowing administrators to enforce security policy across devices.
改进的安全性,管理员可以跨越设备强制应用安全策略。
Improved security allowing administrators to enforce security policy across devices.
改进的安全性,管理员可以跨越设备强制应用安全策略。
应用推荐