Examples of using The secure in English and their translations into Arabic
{-}
-
Colloquial
-
Political
-
Ecclesiastic
-
Ecclesiastic
-
Computer
To promote the development of electronic business and the integration of information and communication technologies through policies, standards of practice and guidelines that encourage competition, growth and the secure and free flow of information.
To facilitate the secure and rapid exchange of information concerning all aspects of the offences established in this Convention, including, if the States Parties concerned deem it appropriate, links with other criminal activities;
As an open work-in-progress, as security strategies in general should always be updated, we encourage the ongoing development through review and contributions from our networks, friends and colleagues of the Secure My Video Guide.
Member States may use this information to determine reports to which they wish to request confidential access, either on site or through the secure remote access system.
(b) To establish and maintain channels of communication between their competent authorities, agencies and services to facilitate the secure and rapid exchange of information concerning all aspects of the offences set forth in this Convention, including, if the States Parties concerned deem it appropriate, links with other criminal activities;
(a) To establish and maintain channels of communication between their competent authorities, agencies and services, including the designation, where appropriate, of a central authority or authorities, to facilitate the secure and rapid exchange of information concerning all aspects of the offences established in this Convention, including, if the States Parties concerned deem it appropriate, links with other criminal activities;
The Secure Zone.
The Secure Certificate.
The Secure Key.
The Secure Drive.
The secure Client Area.
The Secure Sockets Layer.
The Secure World Foundation.
The Secure Wipe Tool.
The Secure Email Environment.
The Secure IP Bind.
The Secure Stations Scheme.
The Secure Email Environment.
The Secure Operations Centre.
The Secure Sockets Layer.