security n. 1.安全(感);安稳;稳妥;平安。 2.确实;确信;把握;可靠性;安心。 3.【军事】防御物。 4.保护;防护;保卫;防御 (against; from); 治安,安全防卫。 5.【法律】保证,担保;抵押。 6.担保品;保证金;借用证 (for)。 7.担保人;保证人。 8.〔pl.〕证券;债券;公债;股票。 9.〔古语〕疏忽;大意。 public security 公安。 public security organs 保卫机关;公安机关。 What security can you offer for it 你对这件事能拿什么做担保呢? S- is the greatest enemy. 疏忽[麻痹大意]是最大的敌人。 give security against 保护;使无…之忧。 go [enter into, give] security for 做…的保人。 in security 安全。 in security for 作…的担保。 on good security 有可靠的抵押。
In addition to creating j2ee 1 . 2 compliant applications and migrating the domain configuration , waspostupgrade also converts the v3 . x security configuration to the v4 security model 除了创建遵循j2ee 1 . 2的应用程序并迁移域配置, waspostupgrade也将v3 . x安全性配置转变为安全性模型。
Checking the location and granting trust at each build enables you to move projects and share projects without having to change the security configuration of the computer manually each time 如果在每次生成时检查位置并授予信任,则可以移动和共享项目,而不必每次手动更改计算机的安全配置。
In addition to a more robust security infrastructure , sp2 improves the security configuration options of windows xp and provides better security information to help users faced with security decisions 除了加固安全基础结构之外, sp2还改进了windows xp的安全配置选项并提供更好的安全信息以帮助用户作出安全决策。
Three security configuration files correspond to the three policy levels supported by caspol . exe : one for the machine policy , one for a given user s policy , and one for the enterprise policy 三个安全配置文件与caspol . exe支持的三个策略级别相对应:一个用于计算机策略,一个用于给定用户的策略,一个用于企业策略。
How to prove the safety and the reliability of the information system , how to decide the proper security configuration has become the key problem for the information security researchers and users 随着信息安全研究的深入,如何证明信息系统可以信赖,如何判定系统的安全设置是否适当,已成为系统使用者所关注的重要问题。
Once access is configured in each instance , then communications between the two instances use service broker transport security when the transport security configuration option is set in both databases 在每个实例中都配置完访问后,如果两个数据库中都设置了传输安全模式配置选项,则这两个实例间的通信将使用service broker传输安全模式。
After migration , you can use the aat and the administrative console s security center to view and modify the migrated security configuration and modify it to more closely match the security roles your company requires 在迁移之后,您可以使用aat和管理控制台的安全性中心来查看并修改已迁移的安全性配置以及将它修该成能更好地匹配您的公司所需要的安全性角色。
In addition , when you want to set the security policy on end user computers , you must use the version of the security configuration tool that matches the version of the . net framework for which the solution was created Net framework版本。此外,如果您希望在最终用户计算机上设置安全策略,则必须使用与解决方案所用于的. net framework版本匹配的安全配置工具版本。
Non - proxy mode service deployments have the option of specifying two distinct ws - security configurations : one for the conversation between the requestor and the gateway and another for the conversation between the gateway and the target service 非代理模式服务部署有一个选项来指定两个截然不同的ws - security配置:一个是服务请求者和网关之间的会话,而另一个是网关和目标服务间的会话。