• Improve computer systems security operations for organizations.

    企业改善计算机安全操作系统

    youdao

  • He and his colleagues have therefore created a way of testing security systems with computer programs called cognitive agents.

    同事因此设计了测试安全系统的方法,这种方法包含一种被之这“认知行为者”的计算机程序

    youdao

  • The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.

    信息安全利益在于——保护计算机系统网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作

    youdao

  • So, Log's security on host is directly related to the security of computer systems.

    因此主机日志安全保护直接关系计算机系统安全。

    youdao

  • Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.

    医疗设备其它计算机系统一样,同样容易出现安全漏洞从而影响到设备安全性有效性

    youdao

  • A computer virus is one kind of threat to the security and integrity of computer systems.

    计算机病毒危极计算机系统安全完整威胁

    youdao

  • Along with the wide application of computer and Internet, the security problem about systems or network becomes more and more important.

    随着计算机网络日益普及有关系统网络安全问题也日益突出

    youdao

  • Emergency Response is regarded as the key problem of dynamic security of computer and network systems.

    应急响应维护计算机网络系统动态安全性关键问题

    youdao

  • Many authorization models have been proposed to ensure information security of computer systems.

    人们已经提出了一些授权模型保证计算机系统信息安全

    youdao

  • As the high performance computer network systems with reliability and security become increasingly important in the recent years, the computer network management system attracts more attentions.

    近年来,随着可靠安全高性能计算机网络系统变得越来越重要,计算机网络管理系统也得到更多关注。

    youdao

  • Security experts are constantly devising ways to protect computer systems from access by unauthorized persons.

    安全专家不断设计新方法用以保护计算机系统免于未经授权之人的访问

    youdao

  • Security models lay the groundwork on which the secure computer systems are found.

    安全模型是构造安全计算机系统基础

    youdao

  • In this major, you'll learn to calculate the security needs of computer and network systems.

    计算机系统安全专业学习计算计算机网络系统安全需求

    youdao

  • Home and business security systems and certain computer software and hardware fall into this category.

    家用商用安全系统某些计算机软件硬件属于

    youdao

  • Openness and security in library computer application systems are mutually contradictory and restrictive.

    图书馆计算机应用系统中的开放性安全性相互对立又相互制约的。

    youdao

  • The importance of secure operating systems in computer security iscausing more and more attention.

    安全操作系统计算机安全中的重要作用越来越引起人们的关注。

    youdao

  • The more complicated computer operating systems get, the more riddled they are with unnoticed security holes.

    计算机系统复杂千疮百孔安全漏洞就越多。

    youdao

  • It helps protect computer systems from malicious code and helps protect trusted code from intentionally or accidentally compromising security.

    有助于保护计算机系统免受恶意代码的攻击,保护受信任的代码以使其安全性免受有意无意危害

    youdao

  • Television, laser video, audio equipment , video tape recorder, computer and IT equipments, game machine, copycat, security systems and house electric.

    电视镭射影碟音响器材录像机电脑系统周边设备游戏机复印机、传真机、保安系统及家用电器

    youdao

  • Security is very important in the computer systems, especially in the distributed systems.

    信息安全计算机系统中,尤其分布式系统中至关重要的。

    youdao

  • They study computer systems, telecommunications, information security, budgeting, and more.

    他们学习计算机系统电信信息安全预算等

    youdao

  • Intrusion detection as a new security means is used to detect unwanted attempts at accessing, manipulating, or disabling of computer systems thus can greatly enhance the network security.

    入侵检测作为一种全新安全手段用于检测电脑系统非预期访问控制破坏尝试可以使网络安全性得到很大提高

    youdao

  • Power management and security components and systems for the Computer, Consumer, security components and systems, Industrial (including automotive), and Communications markets.

    电源管理安全元器件系统产品被运用于电脑业,消费电子,网络安全,工业(包括汽车工业)以及通讯领域市场

    youdao

  • Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.

    上世纪七十年代以前保证计算机系统中的信息安全性自主存取控制强制存取控制策略在计算机多安全级系统中得到了广泛的应用。

    youdao

  • The security product components for computer information systems. Part 1:Security function

    计算机信息系统安全产品部件第1部分: 安全功能检测 。

    youdao

  • String matching is a classic research area in computer science and plays an important role in different kinds of network security systems.

    匹配计算机研究领域经典问题,是众多网络安全系统中的关键技术之一

    youdao

  • String matching is a classic research area in computer science and plays an important role in different kinds of network security systems.

    匹配计算机研究领域经典问题,是众多网络安全系统中的关键技术之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定