您要查找的是不是:
- In computer security,the quality or state that enables violations or attempted violations of ADP system security to is traced to individuals who may then is held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- In computer security, the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- In computer security,the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- 76. In computer security,the quality or state that enables violations or attempted violations of ADP system security to is traced to individuals who may then is held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- For a compendium of system security definitions. 以获得关于系统安全定义的概要。
- In computer security, the containment of users and resources in an ADP system in such a way that users and processes are separate from one another as well as from the protection controls of the operating system. 在计算机安全学中,自动数据处理系统中的用户和资源的相关牵制关系,也就是用户和进程彼此分开,且和操作系统的保护控制也分开来。
- System Security - IBM Security password retry count exceeded. 系统安全性 - 超出 IBM 安全性密码重试次数。
- System Security - Security password retry count exceeded. 系统安全性 - 超出安全性密码重试次数。
- System Security - Embedded Security hardware tamper detected. 系统安全性-检测到。
- The architecture, function and application of Guangdong Center for Seismic Precursory Network( ADP system) are introduced in this paper. 介绍了广东省ADP数字地震前兆综合观测台网中心系统的构成、能以及运行情况。
- Snapshot of system security policy and user rights are saved. 系统安全策略和用户权利的快照已被保存。
- Abstract: Authenticating user is a core part of system security. 文章摘要: 对用户的认讧是系统安全的核心组成部分之一。
- In computer security,measures required to protect against unauthorized(accidental or intentional) disclosure,modification or destruction of ADP systems and data,and denial of service to process data. 计算机安全学中用于防护未授权(偶然的或蓄意的)的泄露、修改或销毁自动数据处理系统及数据以及拒绝处理数据的方法。
- In access control,the process that enables,generally by the use of unique machine-readable names,recognition of users or resources as identical to those previously described to an ADP system. 在存取控制中,通常以机器可识别的名字来确认用户及资源与先前对自动数据处理系统描述过的一样的过程。
- In general, data security and system security can be separately distinguished. 通常,数据安全和系统安全可以分开来考虑。
- In computer security, measures required to protect against unauthorized(accidental or intentional) disclosure, modification or destruction of ADP systems and data, and denial of service to process data. 计算机安全学中用于防护未授权(偶然的或蓄意的)的泄露、修改或销毁自动数据处理系统及数据以及拒绝处理数据的方法。
- The result is determined by the system security policy exclusive of any. 策略之外的系统安全策略决定。
- In access control,the process that enables,generally by the use of unique machinereadable names,recognition of users or resources as identical to those previously described to an ADP system. 在存取控制中,通常以机器可识别的名字来确认用户及资源与先前对自动数据处理系统描述过的一样的过程。
- Series on developerWorks is a must-have tool for Linux system security. 系列文章是实现Linux系统安全性的一个必备工具。