您要查找的是不是:
- A 2007 survey by the Computer Security Institute found that 50 percent of respondents had a laptop or other mobile device sto-len in the past year. 一份计算机安全研究协会2007年的调查发现,有50%25的受访者在过去的一年里有笔记本电脑或其他移动设备被偷。
- Computer Security Institute 计算机安全机构
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- R. Bace and M. Peter, “NIST Special Publication on Intrusion Detection Systems”, National Institute of Standards and Technology - Computer Security Resource Center, Feb 2001. 资讯技术-资讯安全管理的作业要点,经济部标准检验局,2002年。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- Theory and practice of cryptographic techniques used in computer security. 应用于计算机安全的密码技术理论和实践。
- VDS has gained great attention because of its importance in computer security. 由于其在计算机安全领域中的重要地位,一直以来都受到广泛的关注。
- He is a member of the Hong Kong Securities Institute and the Hong Kong Actuarial Society. 凌氏现为香港证券学院及香港精算学会会员。
- In computer security, especially specifies embezzlement with the aim of or directly using a computer and / or network. 在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。
- In computer security,unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security,the removal of obsolete data by erasure,by overwriting of storage or by resetting registers. 计算机安全学中,用删除或重写存储信息或用寄存器清除等方法消除无用数据的过程。
- There are 13 prisons for adult males,consisting of four maximum,four medium and five minimum security institutions. 为成年男犯而设的监狱共有13间,其中高度设防监狱和中度设防监狱各占4间,低度设防监狱则有5间。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最为经典的计算机多级安全模型。