由于设备丢失或者被窃而导致的数据泄漏。
密码是无与伦比的防止数据泄漏手段。
Cryptography is a unique measure for combating data compromise.
不出意外的话,2017年还将会发生更多的数据泄漏事件。
Not surprisingly, there will be more data leakage events in 2017.
这种加密方式能防止磁盘丢失和文件被复制导致的敏感数据泄漏。
This encryption method can prevent the loss of disk and file replication caused by sensitive data leakage.
本文所研究的文档透明加密系统是一个完整数据泄漏防护解决方案的重要组成部分。
The file transparent encryption system proposed in this paper is an important part of a whole data loose prevention solution.
虽然身为老板,他对数据泄漏负有责任,但鲜有证据表明索尼的防护系统就比业内其他公司的差。
He bears responsibility for the data breach, because he is the boss, but there is scant evidence that Sony's defences were worse than the rest of the industry's.
虚拟机复制造成的数据泄漏也是一个类似的漏洞,原因同样在于为了提供随需服务而进行镜像克隆。
Data leakage by virtual machine replication is a vulnerability that's also rooted in the use of cloning for providing on-demand service.
为了降低数据泄漏的风险,常常需要实施数据存储策略,或在桌面级使用加密软件保护敏感数据。
Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.
今年股价跌了四分之一,公司连续三年亏损,黑客入侵在线服务系统,使大量机密的客户数据泄漏,造成潜在危害。
THE share price has fallen by a quarter this year. The company has lost money for three years in a row.
US B拦截器是一个强大的和直接的软件,为您提供了防止数据泄漏和阻止未经授权使用计算机设备的可靠手段。
USB Blocker is a robust and straightforward piece of software that provides you with a reliable means of preventing data leaks and blocking the unauthorized use of computer equipment.
图形用户界面提供浏览功能,以便验证可疑内存泄漏区域和了解组成这些泄漏区域的数据结构。
The graphical user interface provides browsing capabilities for verifiing suspected memory leak regions, and for understanding the data structures that comprise these leaking regions.
此方法不仅可以标识有增长现象的低级对象,而且还可以标识各种泄漏对象所属的高级数据结构。
This approach not only identifies low level objects experiencing growth but also identifies higher level data structures, of which the various leaking objects are part.
但是,这些数据通常对于分析内存泄漏和了解应用程序基本架构和范围而言是足够的。
The data is usually sufficient, though, for diagnosing memory leaks and getting a basic understanding of the application's architecture and footprint.
这是因为对象的泄漏数据结构和有效对象缓存通常不好区别。
This is because leaking data structures and valid caches of objects are often indistinguishable.
如前所述,此列表应包含与聚合数据结构级别表(如图5所示)相同的顶级泄漏疑点。
As mentioned earlier, this list should contain the same top leak suspects as shown in the aggregated data structure level view (Figure 5).
什么正在导致数据结构泄漏?
它描述了清单1所示的内存泄漏示例中创建的数据结构。
This describes the data structure created in the memory leak example shown in Listing 1.
在测试过程中,使用各种自动化的技术来启用压力/负载测试、内存泄漏分析、数据完整性测试,和回归测试。
Various automation techniques were employed to enable stress/load testing, memory leak analysis, data integrity testing, and regression testing throughout the test effort.
它为您展示关于堆的所有信息,包括可能造成泄漏的和重要的数据结构。
It shows you overall information about the heap including leak suspects and significant data structures.
它使用直接可用的数据并进行必要的近似评估,以提供存在内存泄漏的可靠通知。
It USES freely available data and makes the necessary approximations to provide reliable notification of the presence of memory leaks.
这个视图比聚合数据级泄漏疑点列表更加简单。
This is a simpler view than the aggregated data level list of leak suspects.
泄漏单元:存在多个实例的数据结构内的对象。
Leaking unit: the object in the data structure where there are multiple instances present.
所属权上下文中的数据类型和内容还有助于确定整个泄漏应用程序中某个特定高级别组件的不足。
The data types in the ownership context and contents also help to ascertain blame to a particular high level component in the whole memory leaking application.
总大小的差别是由于聚合数据结构级别视图使用汇总实例计数,对象/类泄漏疑点视图使用实际事例和大小计数。
The difference in cumulative size occurs because the aggregated data structure level view uses summarized instance counts and the object/class leak suspects view uses actual instance and size counts.
图6显示了与聚合数据结构泄漏疑点视图(如图5所示)中的前两个泄漏疑点相同的一点。
Figure 6 shows the same two leaks that are shown in the aggregated data structure leak suspect view (Figure 5).
所有者链中的对象的数据类型和包名称有助于标识导致内存泄漏的应用程序组件。
The data types and package names of objects in the owner chain help to identify the application component responsible for the memory leak.
作为调查的一部分,我们认为这不是微软内部数据的泄漏并开展我们的标准工作程序来帮助用户重新控制他们的账户。
As part of that investigation, we determined that this was not a breach of internal Microsoft data and initiated our standard process of working to help customers regain control of their accounts.
内容:泄漏根下为堆消耗的大部分负责的实际数据。
Contents: the actual data that is responsible for the majority of heap consumption under the leak root.
我们不打算泄漏保密信息,我们更愿意从公共数据入手。
Rather than Posting confidential information that someone has leaked to us, we prefer to start with publicly available data.
标识可疑数据结构有助于更好地理解内存泄漏的根源。
Identification of suspected data structures aid in a better understanding of the root cause of a memory leak.
应用推荐