Perhaps that is a coincidence that China's WTO accession coincided with the time each of the domestic Security Show time close.
也许是巧合,中国加入WTO的时间正好与每年的国内安防大展时间贴近。
After the UN Security Council imposed the most serious sanctions on Pyongyang, what is needed now is for all parties to show wisdom and patience.
联合国安理会对平壤实施了最严厉的制裁之后,现在需要各方拿出智慧和耐心。
The log should show what type security problem a cloud service type had and when and how the problem was fixed.
日志应该显示一个云服务类型拥有何种类型的安全问题,以及该问题是在何时和如何修复的。
Companies need to show us more stability and security and need to provide us with more solutions to link and/or sync our local data to their services.
服务提供商应该让我们看到更强的稳定性和安全性,并提供更多方案把我们的本地数据和他们的网络服务进行连接和/或同步。
A hard-linked file does not require the user to have access rights to the original file and does not show the location of the original, so it has some security advantages.
硬链接的文件不需要用户有访问原始文件的权限,也不会显示原始文件的位置,这样有助于文件的安全。
For Saturday night's show the venue was ringed with soldiers carrying machine guns. There were security checks for the audience.
因为周六晚上的演出,四处可见手持重机枪的士兵。还有对观众的安全检查。
In order to show the effects of data disclosure control by defining and enabling security policies, you need to send a few sample events to RFIDIC by using its capture interface for message queues.
为了显示定义并启用安全策略所产生的数据公开控制的效果,需要使用RFIDIC的捕捉接口向RFIDIC发送一些示例事件。
Does the documentation show the interaction with the service registry, which certainly affects availability, performance and security?
文档体现了服务注册的交互吗?这肯定会影响可用性,性能和安全。
For the sake of security, the SOP makes a lot of sense because it doesn't allow a page from one origin to access, manipulate, and show data taken from another origin.
因 SOP不允许来自一个源头的页面访问、处理和显示来自另一个源头的数据,所以它对安全性很有意义。
Computer experts at the University of California in San Diego set out to show how easily keys could be copied from a digital image to highlight the potential security risk of leaving keys on display.
为了强调钥匙曝光的对安全造成的潜在危险,圣地亚哥加利福尼亚大学的计算机专家打算证明通过数码照片配制钥匙轻而易举。
Information on how to do this step can be found in the Resources section, however the following tables show the main parameters used to configure WS-Security binding and configuration for a WS-UNT.
有关如何做这一步的信息可以在参考资料部分找到,然而以下表格显示的是用于配置WS -UNT的WS - Security绑定和配置的主要参数。
Click Show plan to see the deployment plan that will be used to deploy this security realm.
单击showPlan,以观察将用于部署这个安全领域的部署计划。
In the next section, we discuss the problems that arise with DB2 Web Service provider security and show how to address this in WebSphere.
在下一节中,我们讨论DB 2Web服务提供者安全性所引起的问题,并展示如何在WebSphere中解决这些问题。
The next figures show test times for the following security configurations
下图展示了以下安全配置的测试时间
The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).
接下来的三个图展示如何添加安全性约束(图8),如何设置正确的URL和HTTP方法(图9)以及如何针对该约束允许“DADXUser”角色(图10)。
The next two figures show the relative test times for the following security configurations
随后的两组数据显示了遵循安全配置的相对测试时间
This article will show you what is required to create the security realms provided by Community Edition and how to use them to configure Web application security.
本文将向您展示在创建CommunityEdition提供的安全领域时所需的内容,以及如何使用它们来配置Web应用程序安全性。
In the next article I'll show you how to package the pieces from this one into a Firefox extension, with updates to the script to take advantage of the lowered security barriers.
在下一篇文章中,我将向您展示如何将本文的代码打包为一个Firefow扩展,并对脚本进行更新以利用更低级别的安全限制。
Sophos senior security consultant Carole Theriault said that while the U.S. remains the top spam dog, there results show an urgent need for countries to join together and take global action.
Sophos高级安全顾问CaroleTheriault表示:“虽然美国仍然位居垃圾邮件发送国榜首,但是这项结果表明,其迫切地期望与世界各国共同合作,采取全球反垃圾邮件的行动。”
In the following steps we will show you how to create and configure the project and how to set up Security LDAP realm in WASCE.
在接下来的步骤中,我们将展示如何创建并配置这个项目以及如何在WASCE中设置SecurityLDAP。
These results show that WS-Security symmetric encryption with client-generated keys is nearly as fast as WS-SecureConversation, especially for larger messages.
这些结果表明使用客户端生成的密钥进行WS - Security对称加密几乎和WS - SecureConversation一样快,特别是对于较大的消息。
Figures 10 and 11 show how to define a security policy for the Traceability Server.
图10和图11演示如何为TraceabilityServer定义安全策略。
The Pentagon has said they would prefer for security and deterrent purposes that we not show them this.
五角大楼称,他们出于安全和威慑的考虑,要我们最好不要公布这些地区。
As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.
作为一个展示两者不同的注意事项的示例,外部应用程序的安全考虑要比内部应用程序的严格得多。
Shanghai Daily said that "security at the show was taken by surprise by the size of the crowds," but doesn't comment on the rumors of more serious problems.
上海日报称“安排在演出现场的安保人员被人群规模吓了一跳”,但是并未对有关更多严重事件的谣言做出评论。
The American ambassador's reasoning serves the interests of a his country, which is desperate to show that Afghanistan is succeeding in taking over responsibility for its own security.
美国大使的逻辑对他自己的国家是有利的。美国迫不及待地要表现出,阿富汗正在成功地接过保卫自己国家的责任。
Increasing numbers are filing for Social Security disability, available to people who can show they have a medical condition that is likely to keep them out of work for at least a year.
越来越多的人开始申请社会保障为无工作能力的人提供的救济。 只要能提供证据证明自己有身体疾病,可能在至少一年内无法工作,就可以申请这项救济。
Therefore, for the sake of the security and freedom of all individuals, let us curb our egocentrism, and try to show your concern for others.
正是为了“我”的安全与自由,请不要再“唯我独尊”,而多些对“他人”的关爱吧。
Therefore, for the sake of the security and freedom of all individuals, let us curb our egocentrism, and try to show your concern for others.
正是为了“我”的安全与自由,请不要再“唯我独尊”,而多些对“他人”的关爱吧。
应用推荐