| 1. | Ipsec can meet many security needs Ipsec可以满足多种安全需求。 |
| 2. | Consider the security requirements of the functional application 考虑功能性应用程序的安全需求。 |
| 3. | That is , safety demand is restricted by economic level 也就是说,人类的安全需求受经济水平的制约。 |
| 4. | This chapter describes deployment representations for security requirements 本章描述安全需求的典型布署。 |
| 5. | For instance , the security needs of a home user are completely different from a network in a bank 例如,家庭用户的安全需求与网络银行完全不同。 |
| 6. | Second , based on security need analysis , i induce some insecure programming templates 然后从安全需求出发,归纳了一些常见的不安全编程的类型。 |
| 7. | In the end , you should choose to use the form of encryption that meets your security requirements 最后,您应该选择使用符合自身安全需求的加密方式。 |
| 8. | In the paper , the analysis of security characters and security requirement of wlan is made at first 本文首先分析了无线网络的安全特点和安全需求。 |
| 9. | The authentication system can meet the security require of the application system in military network 军网身份鉴别系统满足了军网应用系统的安全需求。 |
| 10. | Repair , overhaul and update all cryogenic centrifugal pumps to meet the latest safety requirements 彻底检查、修理,不断改进低温泵性能,满足最新的安全需求。 |