您要查找的是不是:
- One technology security research firm believes that harmless or legitimate uses of caller ID spoofing are the exception rather than the rule. 一家科技安全研究公司认为无害或合法更改来电显示属于例外而不是常规。
- Information technology security provides a risk management approach for addressing confidentiality, integrity, and availability issues as they related to systems, data and assets. 所谓资讯科技的安全措施,是透过风险管理以确保系统、数据及资产等方面的保密、完整及可用性。
- US Defense Technology Security Administration Director Tarbell admitted that he was not aware of any evidence that this access resulted in a technology transfer that would significantly affect America's national security. 美国国防保密局局长塔贝尔也承认,他“还没有任何证据证实这种接触导致了对美国国家安全有严重影响的技术转让”。
- Defense Technology Security Administration 国防技术保密局
- Defense Technology Security Agency 国防部技术安全局
- information technology security evaluation criteria 信息技术安全性评价标准
- Information Technology Security Evaluation Method 信息科技安全评估办法
- European Information technology Security Evaluation Criteria, ITSEC 欧洲信息技术安全评估标准
- Discussion About Initial Plan on Technology Security Project 技防工程初步设计方案论证工作探讨
- Technology is a booming sector of the economy. 技术是一个迅速发展的经济部门。
- European Information Technology Security Evaluation Criteria 欧洲信息技术安全评估标准
- The compact disc is a miracle of modern technology. 激光唱片是当代技术的奇葩。
- The science and technology of space flight. 航天学,宇宙航行学研究宇宙飞行的科学及技术
- Large scale industry emerged only gradually as technology evolved. 大工业只是随着技术发展而逐渐开始存在的。
- I'd like to borrow a book a book on computer technology. 我想借一本计算机技术方面的书。
- He's keeping an eye out for modern trends in space technology. 他密切注意空间技术方面的新趋势。
- Research of Image Superimposition Technology Security on Video System 视频监控系统中图像叠加技术安全性的研究
- Radar technology; a radar installation. 雷达技术; 一个雷达站
- Jiajia Security Technology Development Co., Ltd. 嘉佳保安科技发展有限公司。
- The firm has to overcome its resistance to new technology. 这家公司必须克服对采用新技术的阻力。
