Examples of using Security requires in English and their translations into German
{-}
-
Official
-
Colloquial
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Security requires constant attention.
Stronger together Security requires strong partners.
Security requires more than a just few cameras and smoke detectors.
There is little hope of any change for the better unless the Security Council's permanent members conclude that their own security requires resuming détente among themselves and launching serious disarmament negotiations, as promised.
Security requires not just troops, but laws and their enforcement.
Effective IT security requires a holistic approach.
True security requires 24/7 detection and monitoring along with the latest continuity and compliance capabilities.
Increased security requires archiving, e.g. with Google Apps for Business with Vault.
Effective security requires quickly getting the right data to the right security products.
Social security requires"paradigm shift" to remain pillar of decent work- ISSA News- ISSA.
Fourthly, cyber security requires highly active and efficient mechanisms for international cooperation and coordination.
Rethinking Cyber Security requires designing organizational structures and creating an awareness of security on all hierarchical levels.
Human security requires greater collaboration and partnership among Governments, international and regional organizations and civil society.
ESET Endpoint Security requires a username and password- Likely caused by incorrect authentication data(username and password) in the update section.
Integrated security requires that SQL Server run on the same computer as IIS, unless the administrator has configured delegation between computers.
Improving security requires developing European and national capacity to respond to health emergencies in a co-ordinated and efficient manner, while also respecting human rights protection and the shared values of the European Charter of fundamental rights.
The security required for the issue of the certificate is lodged.
To apply for a certificate and lodge the security required in that connection, where the tendering procedure relates to sugar intended for animal feed.
In making such data transfers,we make sure to protect your personal data by applying the level of security required by applicable privacy laws.
The risk management at GF Machining Solutionsgives management the security required to deal with risks and opportunities.
Dimension andcalculate machine elements taking into account the prevailing environmental conditions and the security required.
The risk managementframework at Georg Fischer gives management the security required to deal with risks and opportunities.
The goal was to equip workers and management to new needs and to the restructuring that growth,employment and future security required.
The risk management at GF Machining Solutions gives management the security required to deal with risks and opportunities.
The report on its implementation in Greece concluded that the derogation system was successful and constituted a flexible and efficient process,which would not compromise the level of security required in the Schengen area.
Societal challenges related to issues such as sustainable development, climate change, health, the ageing population,social and economic inclusion and security require new paradigm-breaking solutions in which ICT plays a key role.
Topics such as design for manufacturing, design for test,design for logistics or design for security require project-specific in-depth expertise in order to offer the OEM the best possible conditions for its market success.
These licences will be issued in accordance with the provisions of the Regulation on the COM in rice, particularly as regards the time limits for applying for and issuing licences,their terms of validity and the securities required.
Except in cases of force majeure, the security required under Article 3 shall be released only in respect of such quantity as to which the tenderer is able to furnish proof of exportation under an export licence issued pursuant to Article 8, or as to which his tender has been refused.
Since we were already using Axway SecureTransport for such a strategic and critical application as TREMA,upon further study it became obvious that the solution provided the security required to handle our data exchanges with our trading partners and other entities," said Peter Betzler, Senior IT Consultant for E. ONIT, which is the IT provider and support function for the entire business.