Additional examples are adjusted to the entries in an automated way - we cannot guarantee that they are correct.
In good enough time to change course or take counter-measures.
Which is good, because we need to put certain counter-measures in place.
It was also time for their own counter-measures to be launched.
There was no hint as to what any of these counter-measures might be.
When we saw the pattern counter-measures were instituted at once.
To have taken the appropriate counter-measures to ensure his privacy.
Counter-measures were quickly introduced in response to the use of chlorine.
Defence in depth means having multiple counter-measures, which don't have to be each completely effective.
It also comes with flares and other counter-measures in case of an attack.
I'm not going to endanger our counter-measures just for the pleasure of their company.
There the report was evaluated and appropriate counter-measures were initiated.
This was a state of things against which it was difficult to take counter-measures.
As we now know, Russia will react, if not in equal measure, then certainly with counter-measures.
In addition, they appear to agree on the need to take harsh counter-measures against terrorists and the countries that support them.
These changes will transform the environmental conditions on Earth unless counter-measures are taken."
Some economic measures and counter-measures were taken on both banks of the Dniester.
Money laundering methods and techniques change in response to developing counter-measures.
His plan now was to let the counter-measures do their own work and to try and slip away from the scene.
Pearson's counter-measures were economically sound, but not, in the circumstances, easy to sell.
I have the same counter-measures bred in me that you have.
Therefore all actions or counter-measures must have a legal basis in:
The system also accounts for its own types of attacks and locks by providing counter-measures.
Counter-measures implemented by the company resulted in only a modicum of success.
The infestation is persistent and pervasive, but so must be our counter-measures.
The suspicious activity is reported to other networks allowing appropriate counter-measures to be applied.