• Computer Forensics emerged in the 1960s.

    计算机取证诞生上世纪60年代

    youdao

  • Study on Relevant Law and Technology Issues about Computer Forensics;

    大型计算机上采用了若干存取方法。

    youdao

  • Computer Forensics System includes two sections: evidence search and evidence analysis.

    计算机取证系统包括证据搜索证据分析部分。

    youdao

  • Imagine being able to easily acquire the skills of a seasoned computer forensics expert from a bootable Linux CD.

    设想一下,我们可以通过张可引导Linux CD直接学到经验丰富计算机取证专家技能

    youdao

  • Collecting evidence from compromised systems is the job of computer forensics experts, the Sherlock Holmes of the digital age.

    遭遇安全威胁系统中搜集证据计算机取证专家(数字时代福尔摩斯)的工作

    youdao

  • The basic knowledge and application features about computer forensics and LZW lossless compression algorithm are introduced.

    介绍了计算机取证LZW无损压缩算法基本概念应用特点

    youdao

  • An integrity scheme based on computer forensics and DSA signature is proposed to testify to the integrity of computer evidence.

    该文计算机取证基础上,运用DS A签名机制,提出了一种证明计算机证据完整性一致性方案

    youdao

  • In fact, with thousands of investigations under our belt, we cover the entire spectrum of computer forensics and digital crime.

    事实上通过我们地带进行上千次的调查研究,我们已经掌握所有电脑取证数字犯罪的特征。

    youdao

  • Therefore, how to study the information on the storage medium access and analysis of computer forensics becomes an important issue.

    因而研讨如何存储介质信息停止获取剖析成为计算机取证重要议题

    youdao

  • Collecting and securing evidence is the core content of the computer forensics technology, and it is the research hot spot currently.

    电子证据获取计算机取证技术中的核心内容,是计算机取证研究的的热点

    youdao

  • Computer Forensics is a technology to provide thorough effective and safety evidence about how to investigate computer-related crime.

    计算机取证一种如何调查计算机犯罪提供彻底有效安全证据技术

    youdao

  • Based on this knowledge, the search time cost problem of computer forensics is discussed, and a solution to reduce time cost is offered.

    基础上,详细分析计算机取证技术搜索时间成本问题提出一种降低时间成本的解决方案

    youdao

  • Computer Forensics hardware devices are mainly the following: Forensic Drive Duplicator and Computer Forensics Investigation Bin, and so on.

    计算机取证硬件设备主要有:取证硬盘拷贝机计算机取证勘查

    youdao

  • But the biggest problem, says Ross Anderson, also of Cambridge university, is that police computer forensics departments are chronically under-resourced.

    同样来自剑桥大学RossAnderson表示最大问题警方计算机取证部门长期缺乏资源。

    youdao

  • First, the paper introduced the research statuses of computer forensics and movable devices, and then gave the purpose and significance of the subject.

    本文开篇计算机取证移动存储技术研究现状进行介绍,给出课题研究目的意义

    youdao

  • Sean Morrissey, a security expert, said on Thursday that the tracking on Apple devices isn't new, or a surprise, to those in the computer forensics community.

    安全专家Sean Morrissey周四苹果追踪设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇

    youdao

  • The research results of this thesis for further study search and analysis of computer evidence, perfect computer forensics system have guiding significance.

    本文研究成果进一步研究计算机证据搜索分析完善取证系统具有一定的指导意义

    youdao

  • Combining the computer forensics to the intrusion defense system, this system is not only a technology, it can do a lot for the law to strike to the hackers.

    计算机取证技术进行研究,并与黑客防范体系结合,使黑客防范体系从技术上辅助法律在实际中担当起打击黑客行为的重要责任。

    youdao

  • The experiment shows that it is able to insure the authenticity, integrality and validity of the digital evidence, and it is a new method for dynamic computer forensics.

    实验表明能够保证数字证据真实性完整性有效性一个新的动态计算机取证方法

    youdao

  • When I say computer forensics, I'm referring to your own investigation using bootable media -not necessarily to forensics needed as evidence in a court case or to obtain a subpoena.

    对于法庭判案所需证据或是为了获得一个传票,这种计算机调查取证并不是必须的。

    youdao

  • Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.

    安全审计系统能够及时用户操作日志的形式记录下来并且违规操作进行阻断,日志信息可以事后取证提供证据

    youdao

  • Then the printing data can be acquired efficiently. The testing results prove that this system has a good performance and is useful in information protection and computer forensics.

    性能测试显示,该系统快速有效地获取打印内容,适用信息保护电子取证等环境,具有较高实用价值。

    youdao

  • Derived there from, the research of computer forensics as a computer science and law of a cross-disciplinary research — computer forensics research is becoming the focus of research.

    由此衍生出计算机取证作为计算机科学法学门交叉学科——计算机取证学成为人们研究关注的焦点。

    youdao

  • Computer forensics are now attracted by researchers and developers abroad, but studied little in our nation, and the products of computer forensics are primarily those based on host.

    计算机取证目前国外正逐步成为研究开发热点国内仅有少量研究文章。

    youdao

  • In view of computer Forensics involved in the knowledge of computer science, law and criminal investigation, the author started this article from technical, procedural and legal point.

    鉴于计算机取证涉及计算机科学法学刑事侦查学学科知识,笔者在撰写本文时技术程序法律角度出发。

    youdao

  • Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.

    取证工具包3目前先进计算机取证软件提供功能数千美元的设备使用。

    youdao

  • The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.

    美国西方发达国家上世纪80年代就已着手开始研究计算机取证取证思想理论技术方法等方面现已取得不少成果

    youdao

  • The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.

    美国西方发达国家上世纪80年代就已着手开始研究计算机取证取证思想理论技术方法等方面现已取得不少成果

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定