• 计算机取证诞生上世纪60年代

    Computer Forensics emerged in the 1960s.

    youdao

  • 计算机取证技术分为静态取证动态取证

    The computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.

    youdao

  • 计算机取证系统包括证据搜索证据分析部分。

    Computer Forensics System includes two sections: evidence search and evidence analysis.

    youdao

  • 摘要计算机取证技术分为静态取证动态取证

    Absrtact: the computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.

    youdao

  • 介绍了计算机取证LZW无损压缩算法基本概念应用特点

    The basic knowledge and application features about computer forensics and LZW lossless compression algorithm are introduced.

    youdao

  • 解决日益猖狂的网络犯罪问题,关键借助法律手段进行计算机取证

    The key way to solving the increasing computer network crime is digital forensics according with the rule of law.

    youdao

  • 计算机取证硬件设备主要有:取证硬盘拷贝机计算机取证勘查

    Computer Forensics hardware devices are mainly the following: Forensic Drive Duplicator and Computer Forensics Investigation Bin, and so on.

    youdao

  • 计算机取证一种如何调查计算机犯罪提供彻底有效安全证据技术

    Computer Forensics is a technology to provide thorough effective and safety evidence about how to investigate computer-related crime.

    youdao

  • 电子证据获取计算机取证技术中的核心内容,是计算机取证研究的的热点

    Collecting and securing evidence is the core content of the computer forensics technology, and it is the research hot spot currently.

    youdao

  • 因而研讨如何存储介质信息停止获取剖析成为计算机取证重要议题

    Therefore, how to study the information on the storage medium access and analysis of computer forensics becomes an important issue.

    youdao

  • 计算机取证目前国外正逐步成为研究开发热点国内仅有少量研究文章。

    Computer forensics are now attracted by researchers and developers abroad, but studied little in our nation, and the products of computer forensics are primarily those based on host.

    youdao

  • 设想一下,我们可以通过张可引导LinuxCD直接学到经验丰富计算机取证专家技能

    Imagine being able to easily acquire the skills of a seasoned computer forensics expert from a bootable Linux CD.

    youdao

  • 文中提出了一种入侵检测取证系统模型考虑入侵检测计算机取证技术结合在一起。

    The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.

    youdao

  • 取证工具包3目前先进计算机取证软件提供功能数千美元的设备使用。

    Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.

    youdao

  • 由于现阶段的计算机取证,大部分将嫌疑硬盘带回实验室,由法政人员进行全盘拷贝。

    Temporary data would clear away when computer was shut down, and the encrypted hardware would add difficulties to forensic personnel.

    youdao

  • 本文开篇计算机取证移动存储技术研究现状进行介绍,给出课题研究目的意义

    First, the paper introduced the research statuses of computer forensics and movable devices, and then gave the purpose and significance of the subject.

    youdao

  • 同样来自剑桥大学RossAnderson表示最大问题警方计算机取证部门长期缺乏资源。

    But the biggest problem, says Ross Anderson, also of Cambridge university, is that police computer forensics departments are chronically under-resourced.

    youdao

  • 实验表明能够保证数字证据真实性完整性有效性一个新的动态计算机取证方法

    The experiment shows that it is able to insure the authenticity, integrality and validity of the digital evidence, and it is a new method for dynamic computer forensics.

    youdao

  • 基础上,详细分析计算机取证技术搜索时间成本问题提出一种降低时间成本的解决方案

    Based on this knowledge, the search time cost problem of computer forensics is discussed, and a solution to reduce time cost is offered.

    youdao

  • 该文计算机取证基础上,运用DS A签名机制,提出了一种证明计算机证据完整性一致性方案

    An integrity scheme based on computer forensics and DSA signature is proposed to testify to the integrity of computer evidence.

    youdao

  • 计算机取证技术局限性主要包括计算机证据的局限性、取证实施过程局限性以及取证软件的局限性。

    The limitation of using the computer technology to collect evidence mainly include: the limitation of the computer evidence, the course of collecting evidence and collecting evidence software.

    youdao

  • 安全专家Sean Morrissey周四苹果追踪设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇

    Sean Morrissey, a security expert, said on Thursday that the tracking on Apple devices isn't new, or a surprise, to those in the computer forensics community.

    youdao

  • 由此衍生出计算机取证作为计算机科学法学门交叉学科——计算机取证学正成为人们研究关注的焦点。

    Derived there from, the research of computer forensics as a computer science and law of a cross-disciplinary research — computer forensics research is becoming the focus of research.

    youdao

  • 鉴于计算机取证涉及计算机科学、法学刑事侦查学学科知识,笔者在撰写本文时技术程序法律角度出发

    In view of computer Forensics involved in the knowledge of computer science, law and criminal investigation, the author started this article from technical, procedural and legal point.

    youdao

  • 认真学习计算机取证技术,包括计算机取证定义计算机取证原则计算机取证流程计算机取证常用工具。

    The author studied knowledge about computer forensics seriously, including the definition of computer forensics, the principle of computer forensics and the process of computer forensics and so on.

    youdao

  • 美国西方发达国家上世纪80年代就已着手开始研究计算机取证取证思想理论技术方法等方面现已取得不少成果

    The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.

    youdao

  • 计算机取证技术当今一种热门动态安全技术采用主动出击方法搜集入侵证据,查出黑客来源有效地防范黑客入侵。

    Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.

    youdao

  • 计算机取证技术当今一种热门动态安全技术采用主动出击方法搜集入侵证据,查出黑客来源有效地防范黑客入侵。

    Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定