• Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.

    1月28日Kerviel滥用职权、违反计算机安全条例伪造文件开始接受正式调查

    youdao

  • Oracle originally filed 10 complaints against SAP, including copyright infringement, violation of the federal computer fraud and abuse act, breach of contract and unfair competition.

    甲骨文原来SAP提出了10项指控,包括侵犯版权、违反联邦计算机诈骗滥用破坏合同不正当竞争

    youdao

  • The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    youdao

  • According to the abuse and problem in teaching process of computer hardware, some ideas of building practice driving teaching system of computer hardware is given in this essay.

    文章针对计算机硬件教学存在弊端问题提出构建计算机硬件“实践驱动式”教学体系几点想法。

    youdao

  • Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • At last, listed the different harmful consequences of abuse of technology measures for computer software.

    最后阐述了计算机软件技术措施滥用带来的诸多法律问题。

    youdao

  • The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测主要目标用于检测非授权误用以及系统内部外部的入侵行为。

    youdao

  • But, of course, not all computer losses are attributable to theft or abuse.

    但是当然并不是所有电脑损失都是偷窃滥用造成的。

    youdao

  • But, of course, not all computer losses are attributable to theft or abuse.

    但是当然并不是所有电脑损失都是偷窃滥用造成的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定