您要查找的是不是:
- Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information. 计算机弱点数据库已成为弱点研究的重要组成部分,对收集、存储和组织弱点信息具有重要意义。
- Study on computer vulnerability taxonomy 计算机脆弱性分类的研究
- This setting makes your computer vulnerable to potentially malicious code and is not recommended. 此设置会使计算机容易受到潜在恶意代码的攻击,因此不推荐您使用。
- In the National Institute of Standards and Technology's ICAT index of computer vulnerabilities, six of the top 10 involve buffer overflows. 按(美国)国家标准与技术协会公布的 ICAT计算机安全隐患指数,在最主要的十项安全隐患中有六项涉及缓冲溢出。
- Hard copy is computer output on paper, printing or graphics. 硬拷贝是出现在纸上、印刷上或图表上的电脑输出。
- The computer has a normal qwerty keyboard. 这台计算机有标准的英文键盘。
- Application of Loosely Coupled Design in Computer Vulnerability Testing and Evaluation System 松耦合设计在计算机脆弱性测评系统中的应用
- The Design, Implementation and Application of a Computer Vulnerability Database System 计算机漏洞库系统的设计、实现与应用
- They kept badgering him to get a home computer. 他们一直纠缠着要他买一台电脑。
- What's the going rate of computer programmers? 计算机程序设计人员的一般工资是多少?
- The clerks figures up the sum on a computer. 办事员用计算机算出总教。
- A slide-rule is a simple analogue computer. 计算尺是简单的模拟计算机。
- The computer disk is sent in a sealed container. 计算机软盘装在密封的盒里寄出。
- The computer has printed out the results you want. 计算机已把你所需要的计算结果印出。
- The computer has read out the results you want. 计算机已把你所需的计算结果读出。
- All our information is up to date on the computer. 我们计算机上的信息都是最新的。
- The computer is more expensive than the typewriter. 这部电脑比这部打字机更贵。
- Does your computer have a modem? 你的电脑有调制解调器吗?
- The gremlins have got into the computer again. 捣乱的小精灵又钻进计算机里了。
- Be careful how you start the personal computer. 要注意怎样起动个人计算机。