您要查找的是不是:
- The former type of evaluation isdone by the National Computer Security Center (NCSC)through the Trusted Product Evaluation Program and iscalled "formal product evaluation. 前一种评估类型是国家计算机安全性中心(NCSC)通过可信的产品评估程序来实现的,并且被叫“正式产品评估。”
- the National Computer Security center 美国国家计算机安全中心
- National Computer Security Center 国家计算机安全中心
- Computer Security Center Standard 计算机安全中心标准
- United States National Computer Security Center, NCSC 正式得到美国国家计算机安全中心
- DOD Computer Security Center 国防部计算机安全中心
- Computer Security Center 计算机安全中心
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- Go to your Control Panel and click on the Security Center icon. 到控制面板,双击安全中心图标。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- He is currently the director of operations for the Southern Theater Network Operations and Security Center. 他目前是业务主任南部战区网络操作和安全中心。
- R. Bace and M. Peter, “NIST Special Publication on Intrusion Detection Systems”, National Institute of Standards and Technology - Computer Security Resource Center, Feb 2001. 资讯技术-资讯安全管理的作业要点,经济部标准检验局,2002年。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- The security center does not give any system maintenance information and users had to look for those information in other places inside Control Panel. 安全中心并没有给任何系统维护,信息和用户不得不寻找这些信息在其他地方在控制面板。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- Security restrictions can be applied universally or just to specific users because 1st Security Center has got the multiuser intuitional interface. 安全方面的限制,可以普遍适用,还是只向特定的用户,因为第一安全中心已得到了多用户直观的界面。