"security"的翻译 使用英语:
字典 中国人-英语
例子 (外部来源,未经审查)
In general, security by obscurity is one of the weakest forms of security. But in some cases, every little bit of extra security is desirable. | But in some cases, every little bit of extra security is desirable. |
for Security | for Security |
Sessions and security | Session fixation |
Maritime Security Section | Maritime Security Section |
SECURITY COUNCIL DOCUMENTS | SECURITY COUNCIL DOCUMENTS |
Social Security Fund | Social Security Fund |
Security Branch Hong Kong | Security Branch, Hong Kong |
With PHP security, there are two sides to error reporting. One is beneficial to increasing security, the other is detrimental. | For example, if an attacker had gleaned information about a page based on a prior form submission, they may attempt to override variables, or modify them |
culture,global issues,security,technology | culture,global issues,security,technology |
MD5Label for no wireless security | MD5 |
art,arts,data,security,war,web | art,arts,data,security,war,web |
Public Security and Emergency Preparedness Canada | Government Operations Centre (GOC) |
Margaret Shaw Comprehensive approaches to school safety and security paper presented at a seminar on school safety and security Paris 12 14 December 2003 | Margaret Shaw, Comprehensive approaches to school safety and security , paper presented at a seminar on school safety and security, Paris, 12 14 December 2003. |
computers,global issues,politics,security,technology,war | computers,global issues,politics,security,technology,war |
AI,algorithm,computers,data,engineering,intelligence,security,technology | AI,algorithm,computers,data,engineering,intelligence,security,technology |
http europa.eu.int information_society eeurope 2005 all_about security electronic_sig_report.pdf | Directive 97 7 EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL |
STATEMENT BY THE PRESIDENT OF THE SECURITY COUNCIL | STATEMENT BY THE PRESIDENT OF THE SECURITY COUNCIL |
Fraumann, E. (1997) Economic espionage security missions redefined. | Fraumann, E. (1997) Economic espionage security missions redefined. |
联络人 Ms. Rena Salayeva Security Affairs Department | Contact Point Ms. Rena Salayeva, Security Affairs Department |
频率 network security level, e. g. high, low | Frequency |
在南非登记的保安公司有 Combat Force Investment Surveys Honey Badger Arms和Ammunition Shideld Security Kas Enterprises和Longreach Security等公司 | The security companies registered in South Africa include Combat Force, Investment Surveys, Honey Badger Arms and Ammunition, Shield Security, Kas Enterprises and Longreach Security. |
Consiglio di sicurezza (Security Council), in Enciclopedia giuridica, Rome, 2000. | Consiglio di sicurezza (Security Council), in Enciclopedia giuridica, Rome, 2000. |
我就买到了安全... I buy security... | I buy security... |
Statement by Joseph E. Schmitz, Inspector General of the Department of Defense, Organization for Security and Cooperation in Europe (OSCE) Forum for Security Cooperation Suppressing Slavery in the 21st Century From Legislation to Enforcement (Nov. 17, 2004) | Statement by Joseph E. Schmitz, Inspector General of the Department of Defense, Organization for Security and Cooperation in Europe (OSCE) Forum for Security Cooperation Suppressing Slavery in the 21st Century From Legislation to Enforcement (Nov. 17, 2004). |
ע Setting this variable MAY cause security issues, KNOW WHAT YOU ARE DOING FIRST. | Setting this variable MAY cause security issues, KNOW WHAT YOU ARE DOING FIRST. |
Regional Mechanisms and International Security in Latin America,edited by Olga Pellicer,UNU Press | Regional Mechanisms and International Security in Latin America, edited by Olga Pellicer, UNU Press |
p Nomura Security Co., Ltd. (2004). Arrangement of Korean collateralized bond obligation. Press release (8 December). | Nomura Security Co., Ltd. (2004). Arrangement of Korean collateralized bond obligation. Press release (8 December). |
Michel Marcus Security and Democracy under Pressure from Violence (Strasbourg France Council of Europe Publishing 2003) | Michel Marcus, Security and Democracy under Pressure from Violence (Strasbourg, France, Council of Europe Publishing, 2003). |
Mr. Van Sittert Senior Inspector and Adviser Bomb Disposal and Research Unit South African Security Services | Mr. Van Sittert Senior Inspector and Adviser, Bomb Disposal and Research Unit, South African Security Services |
PHP, like any other large system, is under constant scrutiny and improvement. Each new version will often include both major and minor changes to enhance and repair security flaws, configuration mishaps, and other issues that will affect the overall security and stability of your system. | Each new version will often include both major and minor changes to enhance and repair security flaws, configuration mishaps, and other issues that will affect the overall security and stability of your system. |
See FAO (2002), Organic Agriculture, Environment and Food Security, Nadia Scialabba and Caroline Hattam, Eds., available at www.fao.org. | See FAO (2002), Organic Agriculture, Environment and Food Security, Nadia Scialabba and Caroline Hattam, Eds., available at www.fao.org. |
Ministry of Justice and Public Security Elments dorientation pour une rforme de la justice en Hati April 1996 | Ministry of Justice and Public Security, Eléments d orientation pour une réforme de la justice en Haïti, April 1996. |
3 Presidential directive on GPS, Office of Science and Technology Policy, National Security Council, 29 March 1996, Washington, D.C. | 3 Presidential directive on GPS, Office of Science and Technology Policy, National Security Council, 29 March 1996, Washington, D.C. |
Enable the security check for internal server redirects. You should use this if you are running the CGI version with Apache. | Install instructions for PHP 4 can be found on the PEAR site. |
正在解决依赖关系transaction state, checking if we have all the security keys for the operation | Resolving dependencies |
Calculates the MD5 hash of the specified filename using the RSA Data Security, Inc. MD5 Message Digest Algorithm, and returns that hash. | Calculates the MD5 hash of the specified filename using the RSA Data Security, Inc. MD5 Message Digest Algorithm |
Process IDs are not unique, thus they are a weak entropy source. We recommend against relying on pids in security dependent contexts. | We recommend against relying on pids in security dependent contexts. |
Providing that w here in occupied territory an individual protected person is detained as a spy or saboteur, or as a person under definite suspicion of activity hostile to the security of the Occupying Power, such person shall, in those cases where absolute military security so requires, be regarded as having forfeited rights of communication under the present Convention . | Providing that w here in occupied territory an individual protected person is detained as a spy or saboteur, or as a person under definite suspicion of activity hostile to the security of the Occupying Power, such person shall, in those cases where absolute military security so requires, be regarded as having forfeited rights of communication under the present Convention . |
据称 Longreach Security公司于1986年在塞舌尔提供军事情报援助服务 | The latter allegedly provided military intelligence assistance services in Seychelles in 1986. |
Liberty and Security of Person. In R. St. J. MacDonald F. Matscher H. Petzold (eds.), The European System for the Protection of Human Rights, Deventer 1993 | Matscher H. Petzold (eds.), The European System for the Protection of Human Rights, Deventer 1993. |
If this is enabled, the PHP CGI binary can safely be placed outside of the web tree and people will not be able to circumvent .htaccess security. | Include ming support. |
Calculates the MD5 hash of str using the RSA Data Security, Inc. MD5 Message Digest Algorithm, and returns that hash. The hash is a 32 character hexadecimal number. | The hash is a 32 character hexadecimal number. |
又见 Security system reform and governance OECD Policy Brief May 2004 and Investing in Development a Practical Plan to Achieve the Millennium Development Goals (2005) p. 31 | See also Security system reform and governance , OECD Policy Brief, May 2004 and Investing in Development a Practical Plan to Achieve the Millennium Development Goals (2005), p. 31. |
Consistent with the African Union Peace and Security Council Protocol, the African Union has been endowed with a far reaching mandate to enhance its prospects of ensuring peace and stability on the continent. The Peace and Security Council was visualized as having the legal power to intervene in member States' domestic affairs, where abuses and violations of human rights were recorded and principles of good governance were flawed. | Consistent with the African Union Peace and Security Council Protocol, the African Union has been endowed with a far reaching mandate to enhance its prospects of ensuring peace and stability on the continent. The Peace and Security Council was visualized as having the legal power to intervene in member States' domestic affairs, where abuses and violations of human rights were recorded and principles of good governance were flawed. |
If you are using the supplied salt, you should be aware that the salt is generated once. If you are calling this function recursively, this may impact both appearance and security. | At install time, PHP determines the capabilities of the crypt function and will accept salts for other encryption types. |