您要查找的是不是:
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- The registered mobile phone number of Standard Chartered Online users will be used to obtain a One-time Password (OTP) for additional security verification (if applicable). 渣打网上理财客户之流动电话号码将会用作接收一次有效密码以供额外保安核证之用(如适用)。
- The difficulty problem of image deform in multi-speed security verification system is discussed in the paper, and a real-time correction algorithm is provided. 目的:文中针对多速度安检系统中存在的图像形变问题进行了研究。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- Using the way of identify verification of cookie and combining varieties of encrypted technique and perfect security configuration of operating system can provide enough support of many needing security verification application. 使用cookie的身份验证方法再结合各种加密手段以及操作系统完善的安全配置就可以为大多数需要安全认证的应用提供足够的支持。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- July 2008, Participated in the Global Security Verification Training held in INTERTEK Hangzhou Company and Wages Research and Improvement Plan (WRIP)Training held in SEARS Shanghai Company. 2008年07月,参加INTERTEK杭州公司举办的全球反恐审核培训和SEARS上海公司举办的工资调查与改善计划(WRIP)的培训。
- Theory and practice of cryptographic techniques used in computer security. 应用于计算机安全的密码技术理论和实践。
- VDS has gained great attention because of its importance in computer security. 由于其在计算机安全领域中的重要地位,一直以来都受到广泛的关注。
- In computer security, especially specifies embezzlement with the aim of or directly using a computer and / or network. 在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。
- user security verification routine 用户安全检验程序
- In computer security,unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security,the removal of obsolete data by erasure,by overwriting of storage or by resetting registers. 计算机安全学中,用删除或重写存储信息或用寄存器清除等方法消除无用数据的过程。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最为经典的计算机多级安全模型。
