This gap between reality and the law has created a significant national security and public safety problem," said Valerie E. Caproni, the FBI's General Counsel.
这处在现实和法律之间的真空地带增加了国际安全和公共安全问题。”联邦调查局的总法律顾问瓦勒理.E.卡波尼说道。
Machines become infected when users click on phishing e-mails, designed to try to gain sensitive information, or visit compromised websites, according to security experts.
安全专家称,当用户点击网络钓鱼(phishing)邮件——设计用来获取敏感信息,访问入侵网站——时电脑便会遭受病毒感染。
Their Columbia, Maryland, company, Jones, Dykstra &Associates, supplies computer forensic, e-discovery and litigation support and computer security training services.
他们的公司Jones,Dykstra &Associates位于马里兰州哥伦比亚市,提供电脑诊断、数据恢复、诉讼支持和电脑安全培训服务。
In an environment with WebSphere security enabled, you will also need to make provisions for the CSIV2 and SAS addresses (c, d, e), depending on your application and system requirements.
在启用了WebSphere安全性的环境中,您还将需要提供CSIV2和SAS地址(c、d、e),取决于您的应用程序和系统需求。
On the ground, all big relief operations have communications centres where aid workers go to send e-mails, read the latest security updates and study satellite maps of the affected area.
在受灾现场,所有的大型救援行动都设有通讯中心,援助人员可以在那里发送电子邮件、阅读最新的安全资料,以及研读受灾地区的卫星地图。
There, you'll see an option to reset your security token and have it sent to your E-mail address. After you have your security token, use it in combination with your password to log in.
这里,可以看到一个重置安全令牌并将其发送到您的电子邮件地址的选项,有了安全令牌后,将它与您的密码一起用于登录。
For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.
例如,处理电子商务、银行交易或金融的任何应用程序部分都需要所能提供的最高级别的安全性和加密。
The mobile device tends to loosen its security policy to allow access to device services such as local E-mail boxes.
移动设备可能放松安全策略,以允许访问本地电子邮箱之类的设备服务。
The application testing team has access to all the confidential data for these citizens, including their Social Security Numbers, E-mail IDs, credit card Numbers, annual income, and so on.
应用测试团队可以访问所有这些公民的机密数据,包括其社会安全号、电子邮件ID、信用卡号、年收入等。
It occured to me yesterday in my class that maybe someday there won't be social security Numbers anymore, and on birth everybody will be given an E-mail address.
我昨天上课的时候想到,或许有天大家出生时,得到的将不是社会福利号码,而是一个邮箱地址。
Many e-business applications address a common set of requirements, such as integration, interoperability, security, reliability, scalability, and availability.
许多电子商务应用程序都能处理一组常用的需求,比如集成、互操作性、安全性、可靠性、可伸缩性以及可用性。
By chance, when I got back home, I had an email waiting for me from Mr. Peter E. Sand, director of privacy technology at the US Department of Homeland Security in Washington.
正巧回到家我后收到了一封邮件,来自华盛顿美国国土安全局的隐私保护技术处主任皮特·e·桑德先生。
USENIX Security Symposium in Montreal an e-communications system that destroys messages soon after they have been sent.
USENIX是一种电子通信系统,它可以将发送过信息及时销毁。
Researchers E at Google discovered that security questions as a standalone method for recovering access to accounts is not an efficient model.
谷歌研究员发现,用安全性问题作为恢复账号登录的唯一方式,并不是那么有效。 。
But as anyone who's ever waited impatiently for an E-mail to download can tell you, for data speed, security, and safety, it's better to stick with on-premise hardware.
不过,就像经历过不耐烦地等待一封邮件下载完成的人所告诉你的那样,对于数据速率、保密以及安全来说,还是依靠备用硬件更好些。
NEWSWEEK PAKISTAN's Fasih Ahmed recently conducted an E-mail interview with the nuclear scientist hailed as a hero inside his own country and a threat to global security outside of it. Excerpts.
巴基斯坦的新闻周刊记者FasihAhmed最近与这位被巴基斯坦人民视为英雄,却被国际世界看作全球安全威胁的核科学家,进行了一次邮件访问。
NEWSWEEK PAKISTAN's Fasih Ahmed recently conducted an E-mail interview with the nuclear scientist hailed as a hero inside his own country and a threat to global security outside of it.
巴基斯坦的新闻周刊记者FasihAhmed最近与这位被巴基斯坦人民视为英雄,却被国际世界看作全球安全威胁的核科学家,进行了一次邮件访问。
In the near future, many organizations will, for example, dispense with their own infrastructures for E-mail, backup, and security - and save costs by renting instead.
在不远的将来,很多组织会将其基础设施如邮件,备份和安全系统迁移至SaaS应用,以租赁方式来节省开销。
For example, the Authentication Processing Filter (which I discuss next) stores user information such as username, password, and E-mail address in the security context.
比如,AuthenticationProcessingFilter(我将稍后进行介绍)将用户信息(如用户名、密码和电子邮件地址)存储在安全上下文中。
This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.
这里详细介绍了SET的基本概念、所使用的主要技术以及运行的过程,同时分析了SET是怎样解决网上交易安全性的。
In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features, that you can implement.
在本文中,我们关注e - Commerce系统中可能出现的袭击场景以及您可以实施的预防策略,包括安全特性。
As for spam, ISPs (including mail service providers) could limit their users to, say, 100 e-mails a day; for more, you have to pay or at least post a security bond, or pass some good behavior test.
对于垃圾邮件,网络服务商(包括邮件服务商)应该对用户有所限制,比如说每天只能发一百封邮件,更进一步说,你得付费,或至少发布安全债券,或通过一个好的行为测试才行。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
Despite all the reports of Internet security breaches over the years, including the recent attacks on Google's E-mail service, many people have reacted to the break-ins with a shrug.
尽管过去几年,经常有报道发现互联网安全漏洞,包括最近对GoogleGmail服务的攻击,但许多人对黑客攻击仍不以为然。
Based on the security mode for your CLR assembly, you can execute SQL using ADO.NET, send E-mail, log events, and perform any other action that is available to you through the.net framework.
根据CLRassembly的安全模式,您可以使用ADO.NET执行SQL、发送e - mail、记录事件和执行. NETframework允许的任何其他操作。
This simple activity illustrates the four major players in e-Commerce security.
这个最简单的活动说明了e - Commerce安全中最主要的4个参与者。
Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.
TivoliAccessManagerfor e-business是一款成熟的产品,能够为企业web 环境提供强壮的、基于策略的安全性。
Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.
TivoliAccessManagerfor e-business是一款成熟的产品,能够为企业web 环境提供强壮的、基于策略的安全性。
应用推荐