... 计算器叙述 computer statement 计算机盗窃 computer stealing 计算器储存器 computer storage ...
基于8个网页-相关网页
相反,许多此类犯罪,如挪用资金、篡改记录、盗窃、破坏公物、蓄意破坏和恐怖主义,都可以在没有计算机的情况下进行。
On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer.
他被指控利用25个身份盗窃、非法访问和非法损坏一个受保护的计算机。
He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.
七月,一名前高盛员工因涉嫌盗窃该公司专有的计算机代码而被捕,这一事件将神秘的高频交易(HFT)世界推到了聚光灯下。
The arrest of a former Goldman Sachs employee in July for allegedly stealing the firm's proprietary computer codes thrust the arcane world of high-frequency trading (HFT) into the spotlight.
应用推荐