您要查找的是不是:
- Special Operations ADP System 特别操作自动化数据处理系统
- United States Special Operations COMmand, USSOCOM. 美国特种作战司令部。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- The select soldiers will be put into special operations. 优秀士兵将被安排给特别行动。
- It is a reliable sidearm for special operations personnel. 它也是一把可靠的特殊行动用个人武器。
- In computer security,the quality or state that enables violations or attempted violations of ADP system security to is traced to individuals who may then is held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- In computer security, the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- Colonel Harding here reports to the Special Operations Executive In London. 哈定上校来这边报告了伦敦那边来的特别作战计划。
- The architecture, function and application of Guangdong Center for Seismic Precursory Network( ADP system) are introduced in this paper. 介绍了广东省ADP数字地震前兆综合观测台网中心系统的构成、能以及运行情况。
- In computer security,the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible. 计算机安全学中,指可以追查对自动数据处理系统的侵害或试图侵害的责任者的性质或状态。
- They may farm out highly specialized operations to other factories. 他们可以把高度专门化的工作外包给其他厂家。
- Frequent contacts with local and overseas law enforcement agencies and consulates were maintained. Special operations were mounted against forgery syndicates. 该处与本港和海外执法机关及各领事馆经常保持联络,并针对伪造证件集团采取特别行动。
- In access control,the process that enables,generally by the use of unique machine-readable names,recognition of users or resources as identical to those previously described to an ADP system. 在存取控制中,通常以机器可识别的名字来确认用户及资源与先前对自动数据处理系统描述过的一样的过程。
- Workers engaging in special operations shall receive special training to acquire the required qualifications. 从事特种作业的劳动者必须经过专门培训并取得特种作业资格。
- In computer security, the containment of users and resources in an ADP system in such a way that users and processes are separate from one another as well as from the protection controls of the operating system. 在计算机安全学中,自动数据处理系统中的用户和资源的相关牵制关系,也就是用户和进程彼此分开,且和操作系统的保护控制也分开来。
- "We also began training special operations forces in the last three or four years," adds Storrs. “在去的三、四年里我们也开始了对特种作战部队的训练,”斯托丝上校继续道。
- In access control,the process that enables,generally by the use of unique machinereadable names,recognition of users or resources as identical to those previously described to an ADP system. 在存取控制中,通常以机器可识别的名字来确认用户及资源与先前对自动数据处理系统描述过的一样的过程。
- The 160th Special Operations Aviation Regiment (a.k.a Nightstalkers) provides SF teams with aviation support. 第160特勤航空团(即夜行者团)为特种部队提供航空支持。
- Xinhua reporters in front of the latest report: India a special operations troops were deployed to the Taj Mahal hotel. 中英文对照:新华网前方记者最新报道:印度一支特别行动部队被部署到了泰姬陵酒店。
- MOSSAD (Institute for Intelligence and Special Operations) is founded in Israel. “情报及特别行动机构”(音译摩萨德)在以色列成立。