Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.
1月28日Kerviel就滥用职权、违反计算机安全条例及伪造文件开始接受正式调查。
Oracle originally filed 10 complaints against SAP, including copyright infringement, violation of the federal computer fraud and abuse act, breach of contract and unfair competition.
甲骨文原来对SAP提出了10项指控,包括侵犯版权、违反联邦计算机诈骗和滥用法、破坏合同和不正当竞争。
The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测系统(IDS)的主要目标是检测计算机系统内部或外部入侵者的非授权使用、误用和滥用。
According to the abuse and problem in teaching process of computer hardware, some ideas of building practice driving teaching system of computer hardware is given in this essay.
文章针对计算机硬件教学中存在的弊端和问题,提出了构建计算机硬件“实践驱动式”教学体系的几点想法。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
At last, listed the different harmful consequences of abuse of technology measures for computer software.
最后阐述了计算机软件技术措施的滥用带来的诸多法律问题。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
But, of course, not all computer losses are attributable to theft or abuse.
但是,当然并不是所有的电脑损失都是由偷窃和滥用造成的。
But, of course, not all computer losses are attributable to theft or abuse.
但是,当然并不是所有的电脑损失都是由偷窃和滥用造成的。
应用推荐