英语人>网络例句>in security for 相关的网络例句
in security for相关的网络例句

查询词典 in security for

与 in security for 相关的网络例句 [注:此内容来源于网络,仅供参考]

Meanwhile, the local Public Security have established a mechanism for rapid operation in which are embedded with command center and patrol, and is capable of coordinating government and police forces in the fight against crime.

与此同时,当地公安已经建立了快速行动,这与指挥中心,巡逻嵌入式机制,并协调在打击犯罪方面的政府和警察部队的能力。

It is…evident that the members of each department should be as little dependent as possible on those of the others, for the emoluments annexed to their offices… But the great security against a gradual concentration of those several powers in the same department consists in giving to those who administer each department the necessary constitutional and personal motives to resist the encroachments of the others.

它是证据,每个部门的成员应该依靠一样少许尽可能那些其他,为了薪水对吞并他们的办公室…但是反对那些几力量的逐渐集中的巨大安全在同一个部门的在给包括执行每个部门必要的宪法和个人动机抵抗其他的侵犯的那些人。

Seek science and humane circulation, nomatter on the natural space, or in the field of the society, or is launchingomni-directionally during the process of studying , for example drink the ethicsproblem of the Human Genome Project to the security of the transgenic food, geneticengineering expert and ethicist have produced common attention , and the arrival ofcybertimes and prosperity of network culture, make the expert and art of the networktechnology learn to form alliances in the family again.

寻求科学与人文的融通,无论在自然的空间上,还是在社会的领域中,或是在研究的过程中,都全方位地展开着,比如对于转基因食物的安全性喝人类基因组计划的伦理问题,基因工程专家同伦理学家产生了共同的关注点,而网络时代的到来以及网络文化的繁荣,又使得网络技术的专家和艺术学家结成了联盟。

FARROW: Well that's not for me to say but you know we have to be realistic - criminals are very inventive and we have to keep working to combat the efforts put in by the criminals to crack whatever security measure is put in place.

法柔:在这个方面我不能确定。我们必须现实地看待这个问题,犯罪分子诡计多端,他们随时会破坏我们建立的任何安全防范措施,所以我们也必须时刻努力,来对付他们的破坏。

It was the boot sector on the back of the disk, for security, followed by a copy of it; in the file allocation table is behind the root folder, which contains the root partition of all files and folders of the entrance (you can see it as a "My Computer" in the address of a disk).

它被放在磁盘的引导扇区后面,为了安全,紧接着是它的一份拷贝;在文件分配表后面是根文件夹,其中包含了分区根目录下所有文件和文件夹的入口(你可以把它看作是"我的电脑"中的某个磁盘符)。

Supervise and monitor the security in hotel area, responsible for fire protection and inform the fire to firehouse in time,etc.

注册并登陆后才能查看企业的联系方式;请或者监控酒店区域的安全及消防报警等工作。

He bypasses the Melian Inc Security Network this would have caused trouble for the lady, but, being foresighted, she'd included a get-out clause in the contract's small print: Does not apply to mortals being driven by Fate who are on their way to cause family rifts and binding chains of "living love and dying pain"( TM in the kingdom.

他迂回在美丽安交通安全网络公司保安网中这下那位女士可能有麻烦了,不过,她有预见能力,早就在合同的避难条款里,加了条限制性附属细则:不应用于被命运驱使的凡人,即就是造成家庭分裂,在王国之内有着'为求爱而死得很惨'

Insularis Trading Co., Ltd., Shenzhen was established in 2007, the company formerly known as Hong Kong, Shenzhen Office insularis company, the company address in Shenzhen Baoan District Longhua Town, Village Plum Villa cloth Minzhi long side of the road, is a trading and processing for the integrated enterprise, the main Kodak factory operators import double PE paper, yellow, Glassine Paper, Release Paper, special security thermal paper industry and various types of special paper.

深圳市小木贸易有限公司成立于2007年,公司前身为香港小木公司深圳办事处,公司地址在深圳市宝安区龙华镇民治村梅花山庄布龙公路旁,是集贸易和加工为一体的企业,主要经营柯达原厂进口双PE相纸,黄色格拉辛纸、离型纸、特种防伪热敏纸等各类工业和特殊用纸。

Mr Ahmadinejad has been particularly active in his globe-trotting diplomacy to fend off efforts by America and other Western governments to penalise Iran in the UN Security Council for its defiance over its nuclear activities.

内贾德现在热衷于用主动的环球旅行外交来应对美国和其他西方政府在联合国安全理事会上就对伊朗的挑衅性的核活动进行处罚的结果。

The book is divided into eight chapters, mainly introduced the super-elliptic curve cryptography algorithms of number theory based on hyperelliptic curve cryptography system, in addition to the core algorithm for computing sub-groups, from the ECC's technical standards to the super-elliptic curve cryptosystem implementation technology, but also on the super-elliptic curve cryptography and ECC and RSA in the security strength, complexity and the realization on the comparison.

全书共分八章,主要介绍了超椭圆曲线密码体制的算法数论基础、超椭圆曲线的密码学体系、除子群运算的核心算法、从ECC的技术标准到超椭圆曲线密码体制的实现技术,同时也对超椭圆曲线密码体制与ECC及RSA在安全强度、复杂度以及实现上进行了比较。

第54/100页 首页 < ... 50 51 52 53 54 55 56 57 58 ... > 尾页
推荐网络例句

According to the clear water experiment, aeration performance of the new equipment is good with high total oxygen transfer coefficient and oxygen utilization ratio.

曝气设备的动力效率在叶轮转速为120rpm~150rpm时取得最大值,此时氧利用率和充氧能力也具有较高值。

The environmental stability of that world - including its crushing pressures and icy darkness - means that some of its most famous inhabitants have survived for eons as evolutionary throwbacks, their bodies undergoing little change.

稳定的海底环境─包括能把人压扁的压力和冰冷的黑暗─意谓海底某些最知名的栖居生物已以演化返祖的样态活了万世,形体几无变化。

When I was in school, the rabbi explained everythingin the Bible two different ways.

当我上学的时候,老师解释《圣经》用两种不同的方法。