• 由于设备丢失或者被窃而导致的数据泄漏

    Data exposure due to device loss or theft.

    youdao

  • 密码无与伦比防止数据泄漏手段

    Cryptography is a unique measure for combating data compromise.

    youdao

  • 出意外的话,2017年会发生更多数据泄漏事件

    Not surprisingly, there will be more data leakage events in 2017.

    youdao

  • 这种加密方式防止磁盘丢失文件复制导致敏感数据泄漏

    This encryption method can prevent the loss of disk and file replication caused by sensitive data leakage.

    youdao

  • 本文研究的文档透明加密系统一个完整数据泄漏防护解决方案重要组成部分

    The file transparent encryption system proposed in this paper is an important part of a whole data loose prevention solution.

    youdao

  • 虽然身为老板数据泄漏负有责任鲜有证据表明索尼防护系统业内其他公司的

    He bears responsibility for the data breach, because he is the boss, but there is scant evidence that Sony's defences were worse than the rest of the industry's.

    youdao

  • 虚拟复制造成数据泄漏也是一个类似漏洞,原因同样在于为了提供随需服务进行镜像克隆。

    Data leakage by virtual machine replication is a vulnerability that's also rooted in the use of cloning for providing on-demand service.

    youdao

  • 为了降低数据泄漏风险常常需要实施数据存储策略桌面使用加密软件保护敏感数据

    Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.

    youdao

  • 今年股价四分之一公司连续亏损,黑客入侵在线服务系统,使大量机密的客户数据泄漏,造成潜在危害。

    THE share price has fallen by a quarter this year. The company has lost money for three years in a row.

    youdao

  • US B拦截器一个强大直接软件提供了防止数据泄漏阻止未经授权使用计算机设备可靠手段

    USB Blocker is a robust and straightforward piece of software that provides you with a reliable means of preventing data leaks and blocking the unauthorized use of computer equipment.

    youdao

  • 图形用户界面提供浏览功能,以便验证可疑内存泄漏区域了解组成这些泄漏区域数据结构

    The graphical user interface provides browsing capabilities for verifiing suspected memory leak regions, and for understanding the data structures that comprise these leaking regions.

    youdao

  • 方法不仅可以标识增长现象低级对象而且可以标识各种泄漏对象所属的高级数据结构

    This approach not only identifies low level objects experiencing growth but also identifies higher level data structures, of which the various leaking objects are part.

    youdao

  • 但是这些数据通常对于分析内存泄漏了解应用程序基本架构范围而言足够

    The data is usually sufficient, though, for diagnosing memory leaks and getting a basic understanding of the application's architecture and footprint.

    youdao

  • 是因为对象泄漏数据结构有效对象缓存通常不好区别

    This is because leaking data structures and valid caches of objects are often indistinguishable.

    youdao

  • 前所述,列表包含聚合数据结构级别(如图5示)相同顶级泄漏疑点

    As mentioned earlier, this list should contain the same top leak suspects as shown in the aggregated data structure level view (Figure 5).

    youdao

  • 什么正在导致数据结构泄漏

    What is causing the data structure to leak?

    youdao

  • 描述清单1内存泄漏示例创建数据结构

    This describes the data structure created in the memory leak example shown in Listing 1.

    youdao

  • 测试过程中,使用各种自动化技术启用压力/负载测试、内存泄漏分析数据完整性测试,回归测试

    Various automation techniques were employed to enable stress/load testing, memory leak analysis, data integrity testing, and regression testing throughout the test effort.

    youdao

  • 展示关于所有信息包括可能造成泄漏重要的数据结构

    It shows you overall information about the heap including leak suspects and significant data structures.

    youdao

  • 使用直接可用数据进行必要的近似评估提供存在内存泄漏可靠通知

    It USES freely available data and makes the necessary approximations to provide reliable notification of the presence of memory leaks.

    youdao

  • 这个视图聚合数据泄漏疑点列表更加简单。

    This is a simpler view than the aggregated data level list of leak suspects.

    youdao

  • 泄漏单元存在多个实例数据结构内的对象

    Leaking unit: the object in the data structure where there are multiple instances present.

    youdao

  • 所属权上下文中的数据类型内容有助于确定整个泄漏应用程序某个特定级别组件的不足。

    The data types in the ownership context and contents also help to ascertain blame to a particular high level component in the whole memory leaking application.

    youdao

  • 大小差别由于聚合数据结构级别视图使用汇总实例计数对象/泄漏疑点视图使用实际事例大小计数。

    The difference in cumulative size occurs because the aggregated data structure level view uses summarized instance counts and the object/class leak suspects view uses actual instance and size counts.

    youdao

  • 6显示了与聚合数据结构泄漏疑点视图(如图5示)中的两个泄漏疑点相同的一点。

    Figure 6 shows the same two leaks that are shown in the aggregated data structure leak suspect view (Figure 5).

    youdao

  • 所有者中的对象数据类型名称有助于标识导致内存泄漏应用程序组件

    The data types and package names of objects in the owner chain help to identify the application component responsible for the memory leak.

    youdao

  • 作为调查一部分我们认为不是微软内部数据泄漏开展我们标准工作程序帮助用户重新控制他们账户

    As part of that investigation, we determined that this was not a breach of internal Microsoft data and initiated our standard process of working to help customers regain control of their accounts.

    youdao

  • 内容泄漏消耗大部分负责实际数据

    Contents: the actual data that is responsible for the majority of heap consumption under the leak root.

    youdao

  • 我们不打算泄漏保密信息我们愿意公共数据入手

    Rather than Posting confidential information that someone has leaked to us, we prefer to start with publicly available data.

    youdao

  • 标识可疑数据结构有助于更好地理解内存泄漏根源

    Identification of suspected data structures aid in a better understanding of the root cause of a memory leak.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定