Computer security systems will be designed by independent technicians 计算机安全系统将由独立的技师来设计。
He served for 10 years as chief executive of Symantec, the computer security company. 他在赛门铁克这家电脑安全公司整整担任了10年的首席执行官。
One point to remember is that trust in computer security must be computationally verifiable. 要记住的一点是相信计算机安全一定能通过计算的方法验证。
They presented the findings at a computer security conference in Chicago. ,他们在芝加哥举行的计算机安全大会上公布了这一发现。
Program Access Controller is one the most effective and innovative computer security programs available. 程序访问控制是一个最有效和创新的计算机安全的程序。
Things only started to go awry when the computer security experts told me this password would no longer do. 当电脑安全专家告诉我这个密码不行了的时候,事情才开始出了岔子。
Finding better tests for distinguishing computers from humans is critical for effective computer security. 对于有效地计算机安全来说,找到区别计算机和人更好的检验方法至关重要。
File monitoring technology is an effective means to ensure computer security. 文件监控技术是保障计算机安全的有效手段。
Design and Implementation of Computer Security Defence System 计算机桌面安全防护系统设计与实现
Demand for its services in architectural design and computer security continued to expand. 至于对建筑设计和电脑保安这两方面的服务需求仍不断增加。
In computer security, a description of the characteristics of an entity to which access is controlled. 在计算机安全学中,一种对存取受到控制的实体的特征的描述。
In computer security, a technique in which certain vulnerabilities are made attractive to a potential attacker. 在计算机安全学中,一种以某些弱点来吸引潜在攻击者的技术。
In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
In computer security, unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
The Design and Implementation of Computer Security Audit Server Management Subsystem 计算机安全检查服务器端管理子系统的设计与实现
Security is not a simple problem of technique but an allround problem which is based on the code security, computer security, network security and information security. 安全问题并不是一个简单的技术问题,而是一个多方面,多角度的,基于密码安全、计算机安全、网络安全和信息安全的融合问题。
There is no single solution to resolve computer security issues. 没有一个解决方案可以解决计算机的安全性问题。
In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
Role-Based Trust Management System ( RBTM) is an effective way to authorization solution in distributed credential management system, and is a hot field in Computer Security. 基于角色的信任委托管理系统是分布式证书管理系统中一个重要的授权管理解决方案,也是计算机安全领域的研究热点。
Hash algorithms are very important functions in computer security. 散列算法对计算机安全起着举足轻重的作用。
They study Internet Security vulnerabilities, handle computer security incidents, and publish security alerts. 他们研究因特网的安全弱点,处理计算机安全事故并发布安全警告。
In computer security, the act of impeding or denying the use of system resources to user. 计算机安全技术中,阻止或拒绝用户使用系统资源的行为。
In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place. 在计算机安全学中,经处理操作后,消磁或重写数据前剩留在存储器中的数据。将第一个操作数输入数据寄存器。
Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
21st century threat intelligence is a non-profit group that dedicate in computer security research. 21世纪威胁情报是一个致力于计算机安全研究的非盈利小组。
When these files are opened, they run in the context of the my computer security zone. 当这些文件被打开时,它们在“我的电脑”安全区域的上下文中运行。
I'm just as surprised by the poor computer security education offered to end-users at most companies. 我只是对大多数公司为终端用户提供的糟糕的计算机安全教育感到吃惊。
That's part of what is wrong with the computer security industry. 这就是计算机安全产业的部分失误之处。
The revelations were shared by the contractor at a meeting of computer security specialists. 这是这家承包商在电脑安全专家会议中透露的。