您要查找的是不是:
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- Theory and practice of cryptographic techniques used in computer security. 应用于计算机安全的密码技术理论和实践。
- VDS has gained great attention because of its importance in computer security. 由于其在计算机安全领域中的重要地位,一直以来都受到广泛的关注。
- In computer security, especially specifies embezzlement with the aim of or directly using a computer and / or network. 在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。
- In computer security,unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security,the removal of obsolete data by erasure,by overwriting of storage or by resetting registers. 计算机安全学中,用删除或重写存储信息或用寄存器清除等方法消除无用数据的过程。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最为经典的计算机多级安全模型。
- Demand for its services in architectural design and computer security continued to expand. 至于对建筑设计和电脑保安这两方面的服务需求仍不断增加。
- In computer security, a description of the characteristics of an entity to which access is controlled. 在计算机安全学中,一种对存取受到控制的实体的特征的描述。
- As an infrastructure of the information security, PKI is a hot topic in the research field of computer security. 作为信息安全基础的公钥基础设施(PKI)已经成为当今计算机安全领域研究的热点问题。
- In computer security, unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security a manually operated switch or device that activates an alarm. 计算机安全学中,指手工操纵的能发生警报的开关或设备。