The report reveals fatal flaws in security at the airport.
报告揭示了机场安全的致命缺陷。
Ensure Include timestamp in security header is checked.
确认选中Includetimestamp in securityheader。
The Moscow subway attack Monday highlighted gaps in security.
周一发生在莫斯科的地铁袭击案攻击暴露了安全缺陷。
The first pass looks for errors in security, which are reported to the SOA team.
第一轮测试查找安全错误,并向SOA团队报告。
Mostly these are fields of struct key_user defined in security/keys/internal.h.
大多数字段是security/keys/internal.h 中定义的struct key_user 的字段。
End user identities are not used in security enforcement but may be included in data for audit.
安全执行中不使用最终用户标识,但可能包括在数据中用于进行审核。
The new DB2 9.7 release also offers organizations more options in security management and high availability.
新的DB 2 9.7版本还在安全管理和高可用性方面提供了更多选择。
You're not standing in line in security with your laptop open. But you are there with your mobile phone.
你在排队安检的时候不会打开手提电脑,但你会一直打开你的手机。
The good news is many common programming errors that result in security holes simply aren't possible in PHP.
值得庆幸的是,导致安全漏洞的很多编程错误在PHP中不可能存在。
Debka, an Israeli website that specialises in security news, says he was leading the effort to eradicate Stuxnet.
专事安全新闻报道的以色列网站狄布开(Debka)表示,沙阿里亚里此前正领导着清除震网病毒的工作。
Utilities and private power firms have failed to install patches in security software against malware threats.
供电设施和私人供电公司并没有给防毒软件打补丁以应对恶意代码攻击。
Enabling at least one of them is a useful tool for finding programming errors that may result in security holes.
至少启用它们中的一个,可以有效地发现可能导致安全漏洞的编程错误。
The program is similar to one in Iraq that was a key factor in security improvements there during the last year.
在过去一年里,在伊拉克实行的一项类似计划对改善伊拉克的治安状况发挥了关键作用。
IPv6 is also much more sophisticated than IPv4, with many new features (including built-in security mechanisms).
IPv 6还要比IPv 4复杂得多,有许多新特性(包括内置的安全机制)。
An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.
由于缓冲区溢位问题近年来在安全性领域中已受到瞩目,这一资料是相当令人灰心的。
The short answer the principle question of why you are doing this is that your organization is interested in security.
为什么您要这样做这个主要问题的简单答案,是您的公司对这个感兴趣。
It doesn't matter how good baked-in security is if a user throws out the welcome mat for whatever crap comes their way.
无论内嵌的安全保护是多么优秀,如果用户对无论什么东西都持欢迎态度的话,这些保护都是没用的。
His advisers say they hope for a rapid improvement in security in and around the Congolese town of Goma, near Rwanda's border.
他的顾问们希望,戈马城(靠近卢旺达边境的刚果城市)周边的安全问题能得到迅速改善。
And they've built in security features that would prevent the laser from being used if pirates managed to take over the ship.
而且,他们还内置了安全特性,以防如果海盗控制船只后使用该激光设备。
These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.
这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。
In security conscious companies this practice is not recommended, and the default approach is to create closed packages for deployment.
在有安全意识的公司里,这项实践是不被推荐的,默认的方法是为开发创建一个关闭的包。
But over the last few years I have seen a remarkable rise in security controls deployed in the field along with renewed customer interest.
但就在最近几年,我看到了这个领域中部署的安全控制显著增长,客户对安全的兴趣也日渐浓厚。
The more intricate security requirements are definitely something that developers, especially ones not versed in security, may easily miss.
就会有更复杂的安全需求来明确开发人员,尤其是对安全并不十分熟悉的人员,他们更容易遗忘。
Audit logging is usually used in security-sensitive environments where changes made to the portal's run time configuration are recorded.
审计日志通常在安全敏感的环境中使用,其中记录对门户运行时配置的更改。
It may also find application in security applications such as video surveillance, where it would be looking for images of suspicious activity.
或将其应用于各安全应用领域,例如视讯监督利用这一技术寻找可疑活动的图像。
BAE systems currently provides similar systems for the Navy, the Homeland security Department and others in security-critical environments.
BAE系统公司将为海军,国土安全部和其他重要的安全环境提供类似系统。
Now is a good time to understand the security threat to the mobile cloud and to begin to prepare for an inevitable increase in security threats.
现在正应该了解移动云的安全威胁,并准备好应对安全威胁一定会增加的态势。
Now is a good time to understand the security threat to the mobile cloud and to begin to prepare for an inevitable increase in security threats.
现在正应该了解移动云的安全威胁,并准备好应对安全威胁一定会增加的态势。
应用推荐