您要查找的是不是:
- You can use this information to fix a security breach. 您可以使用这些信息来修复违反安全性的情况。
- Setting certain environment variables may be a potential security breach. 设置某些环境变量可能是潜在的安全缺口。
- If there is a security breach in a small area, it can permeate the entire system. 如果在小范围内有一安全漏洞,它将扩散到整个系统。
- If there is a security breach in a small area,it can permeate the entire system. 如果在小范围内有一安全漏洞,它将扩散到整个系统。
- A dutch biotech firm reported that they may have had a security breach involving anthrax last week. 荷兰的生物公司报告称 上个星期公司的炭疽可能被盗
- How did a terror cell get its hands on anthrax without a single lab reporting a security breach? 怎么会在一个恐怖组织有炭疽病毒的情况下 连一个安全警报都没有?
- Determine the potential for damage from a successful attack that results in a security breach. 确定攻击成功而导致安全性被破坏的可能性。
- This exposes the data to security breaches. 这就使数据暴露于安全的薄弱环节。
- XSS is a security breach that takes advantage of dynamically generated Web pages. XSS是一种破坏安全的方法,它利用了动态生成的网页。
- Use this tool to take a report server instance offline to investigate a security breach or if you think the report server is being attacked. 若要调查安全违规问题或者您认为报表服务器受到攻击,可以使用此工具将报表服务器实例脱机。
- So hot in fact the rumors swirled the Acura and Honda threatened to pull out of the show in protest for the security breach! 这么热,事实上,巴拉德周围的讴歌和本田的威胁要退出该节目以示抗议的安全漏洞!
- The committee says incidents such as the security breach on the MTAS website, and the loss of 25m child benefit records last year, must be taken more seriously. 该委员会表示,例如MTAS网站安全侵害与去年2500万儿童利益记录丢失的事件必须得到更加严肃的对待。
- We consider this security breach to be a horrendous and inexcusable offense," Norton's statement emphasises, without identifying the consultant concerned or his/her company. 我们认为这是违反保安是一个可怕的和不可饶恕的罪行,在"诺顿的声明强调了,没有查明有关顾问或他/她的公司。
- These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers. 这些帐户还没有被访问的谷歌通过任何安全漏洞,但大多数通过网路钓鱼诈骗或恶意软件在用户的电脑上的可能。
- System monitoring that alerts the enterprise to security breaches. 安全入侵的系统监视。
- Because of that,security has been one of those topics that everyone agreed was important,but no one seemed willing to do much about,except in those rare situations in which a security breach could cause huge amounts of damage. 正因为这些,安全已成为人人都认为很重要的问题之一,但是看来好像还没有什么人愿意对此做很多工作,例外的只是那些安全一旦遭到破坏就会引起重大损失的少见的情况。
- The usual collection mechanism is simple elicitation. The visitor may be asked to give a talk to his colleagues in China,who then pepper him with questions that might induce at least a small security breach on his part. 在中国,外出访问者也许会被同事叫去一块聊天,同事会提出一些尖锐的问题,引诱他说出一些有用的情报。(《形形色色的间谍活动》保尔D-摩尔《华盛顿邮报》1999.;5
- Security breach in Sector 7G. 7G区出现安全裂口。
- Because of that, security has been one of those topics that everyone agreed was important, but no one seemed willing to do much about, except in those rare situations in which a security breach could cause huge amounts of damage. 正因为这些,安全已成为人人都认为很重要的问题之一,但是看来好像还没有什么人愿意对此做很多工作,例外的只是那些安全一旦遭到破坏就会引起重大损失的少见的情况。
- The usual collection mechanism is simple elicitation. The visitor may be asked to give a talk to his colleagues in China, who then pepper him with questions that might induce at least a small security breach on his part. 在中国,外出访问者也许会被同事叫去一块聊天,同事会提出一些尖锐的问题,引诱他说出一些有用的情报。(《形形色色的间谍活动》保尔d-摩尔《华盛顿邮报》1999.;5