您要查找的是不是:
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在計算機安全學中,試圖以裝成一個合法用戶來獲取對某系統的訪問權。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 計算機安全學中,用於修飾或說明與警察局連接的報警系統。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 計算機安全學中,一條安全模型規則,即一客體在被置為不活動后,不能被訪問,直至又被置為活動。
- Tighter computer security control has also been implemented. 此外,本署亦已實施更嚴密的電腦保安。
- The most powerful tool in providing computer security is coding. 保證計算機安全最有效的工具是編碼。
- The registered mobile phone number of Standard Chartered Online users will be used to obtain a One-time Password (OTP) for additional security verification (if applicable). 渣打網上理財客戶之流動電話號碼將會用作接收一次有效密碼以供額外保安核證之用(如適用)。
- The difficulty problem of image deform in multi-speed security verification system is discussed in the paper, and a real-time correction algorithm is provided. 目的:文中針對多速度安檢系統中存在的圖像形變問題進行了研究。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在計算機安全學中,存在於一個系統內的弱點或缺陷,系統對一個特定的威脅攻擊或危險事件的敏感性,或進行攻擊的威脅作用的可能性。
- Simply put, software is at the root of all common computer security problems. 簡單地說,軟體是所有常見電腦安全性問題的根源。
- Using the way of identify verification of cookie and combining varieties of encrypted technique and perfect security configuration of operating system can provide enough support of many needing security verification application. 使用cookie的身份驗證方法再結合各種加密手段以及操作系統完善的安全配置就可以為大多數需要安全認證的應用提供足夠的支持。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在計算機安全學中,一種計算機程序,表面上或實際上有某種有用的功能,而含有附加的(隱藏的)可能利用了調用進程的合法特許來危害系統安全的功能。
- In computer security, a successful unauthorized access to an ADP system. 在計算機安全學中,成功地非法進入自動數據處理系統。
- July 2008, Participated in the Global Security Verification Training held in INTERTEK Hangzhou Company and Wages Research and Improvement Plan (WRIP)Training held in SEARS Shanghai Company. 2008年07月,參加INTERTEK杭州公司舉辦的全球反恐審核培訓和SEARS上海公司舉辦的工資調查與改善計劃(WRIP)的培訓。
- Theory and practice of cryptographic techniques used in computer security. 應用於計算機安全的密碼技術理論和實踐。
- VDS has gained great attention because of its importance in computer security. 由於其在計算機安全領域中的重要地位,一直以來都受到廣泛的關注。
- In computer security, especially specifies embezzlement with the aim of or directly using a computer and / or network. 在計算機安全學中,特指利用計算機和/或網路進行的貪污行為。
- user security verification routine 用戶安全檢驗程序
- In computer security,unintelligible text or signals produced through the use of cipher systems. 計算機安全學中,通過密碼系統產生的不可理解的文字或信號。參閱plaintext。
- In computer security,the removal of obsolete data by erasure,by overwriting of storage or by resetting registers. 計算機安全學中,用刪除或重寫存儲信息或用寄存器清除等方法消除無用數據的過程。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最為經典的計算機多級安全模型。
