您要查找的是不是:
- Assist Executive Assistant in computer and network security management. 协助行政助理进行计算机管理,包括电子邮件帐户管理及网络安全管理。
- computer security management 计算机保密管理
- Network Security management of different subnets. 网路不同网段的安全管理。
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- Modern Hotel Security Management System. 走进现代化的旅店治安管理系统。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Homes District to militarize the public security management. 舍区治安保卫实行军事化管理。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- Enterprise security management is an important safeguard. 安全管理是企业的重要保障。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- NATIONAL COMPUTER SECURITY CENTER. United States. Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria[Z]. NCSC-TG-021, April 1991. 蒋继洪.;计算机系统、数据库系统和通信网络的安全与保密[M]
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- Information Security Management Systems Specification with Guidance for Use. 信息安全管理体系规范及应用导则。
- Security management, check public security patrol and dot-striken records. 对保安进行管理,检查保安巡视、打点记录。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- Secondly, conduct rigid security management of the pooled fund drawing. 二是对共享基金的取用方式进行严格的安全管理;
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- Security management is responsible for user authentication and authorization. 安全管理部门负责用户认证和授权。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。