• Computer crimes include data theft and pirating software.

    计算机犯罪包括数据窃取盗版软件

    《柯林斯英汉双解大词典》

  • Lost devices lead to data theft.

    丢失设备造成数据盗窃

    youdao

  • Users of these services need to be aware of data theft or viruses.

    这些服务用户需要了解数据被盗病毒

    youdao

  • All kinds of computers are vulnerable to electrical failures or data theft.

    所有类型电脑容易遭受电力故障数据被盗

    youdao

  • Blackmail, espionage, data theft. These are things that were proposed as reasonable things to do.

    勒索刺探数据窃取这些当作合理事情提议出来

    youdao

  • Whether you are concerned with privacy, data theft, data loss, or data leaks, Password Folder is an ideal tool for you.

    无论是个隐私数据窃取,数据丢失数据泄漏问题密码文件夹理想工具

    youdao

  • Cloud computing offers new computing opportunities, but it also raises new security issues due to new potential ways for data theft.

    计算提供了全新的计算机遇不过由于新的数据窃取潜在方式带来了新的安全问题

    youdao

  • With mobile and desktop computers acting as storage devices for sensitive information, data loss and data theft are on the rise.

    随着移动台式电脑作为敏感信息存储设备作用数据丢失和数据失窃案不断上升

    youdao

  • As I'm sure you're aware, there are dangers associated with social networking including data theft and viruses, which are on the rise.

    当然使用社交网络亦风险,就是有时会遇到网络偷盗行为病毒这些情况呈现上升的趋势。

    youdao

  • All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information.

    所有类型电脑容易遭受电力故障数据被盗但是细菌对于网络攻击免疫的。可以信息进行安全地保护

    youdao

  • The company, Dataguise, offers automated and advanced database security solutions to help organizations ensure regulatory compliance and protect against data theft.

    Dataguise公司提供自动化高级数据库安全解决方案帮助组织确保遵守法规保护数据免受盗窃

    youdao

  • The interceptable nature of wireless signals and the limited memory and computing power of most handheld devices leaves wireless systems dangerously vulnerable to data theft.

    无线信号截取本质以及大多数手持设备有限内存计算能力使无线系统极易受到数据窃贼的攻击。

    youdao

  • They acknowledge that privacy and data theft are legitimate concerns in a pervasively connected environment, but they feel it is already too late to stop the juggernaut of change.

    他们提到普遍联系环境中,对隐私数据窃取考虑理所应当的,但是,他们感到现在停止变化崇拜已经太晚了。

    youdao

  • Worst yet, they may find themselves more likely targets of hacking, corporate espionage, and data theft, as their contract employees may be similarly fixated on their own profits over all else.

    的是,他们发现自己倾向于非法侵入企业间谍数据盗取因为他们劳务工也是把利润看的一切都重要。

    youdao

  • Palo Alto Networks Director of Threat Intelligence Ryan Olson said the malware had limited functionality and his firm had uncovered no examples of data theft or other harm as a result of the attack.

    帕洛·阿尔网络公司情报总监雷恩·奥尔森表示款恶意软件功能有限的公司还没有发现由于这次袭击而造成的用户数据被盗或者其他损害

    youdao

  • Data and identity theft becomes more and more common.

    数据身份盗窃变得越来越普遍

    youdao

  • As people rely more and more on mobile devices, the chances for loss and theft of data from these devices increases.

    人们移动设备依赖性越来越强,由于设备丢失而导致的数据丢失盗窃事件将增加

    youdao

  • Everyone from grandmothers to Fortune 500 companies has heard the stories of identity theft, data loss, and general mayhem caused by viruses and attackers on the Internet.

    每个人老祖母全球 500强公司听说过互联网病毒攻击者所引起盗窃身份丢失数据一般性伤害的事。

    youdao

  • Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.

    招聘网站频频受到黑客攻击,或遭受通过电子邮件网络钓鱼”的攻击因为它们那些对身份盗窃感兴趣的人提供丰富数据资源

    youdao

  • Identity theft and data breaches are some of the fastest-growing crimes in United States.

    身份失窃数据泄露美国增长最快犯罪类型之一。

    youdao

  • The 30 day cache solves the user-error problem and the fact that data is stored on the Internet solves the fire/flood/theft issue (where USB or network drives may also be affected).

    30缓存解决了用户错误问题,同时由于数据存储互联网上,就避免了火灾洪水盗窃问题USB网络硬盘是无法避免这些问题的)。

    youdao

  • Data exposure due to device loss or theft.

    由于设备丢失或者被窃而导致的数据泄漏

    youdao

  • This is hardly the first time that a big security breach has led to the mass theft of digital data. But the fallout from the Epsilon debacle will spread far and wide.

    已经不是第一由于安全系统遭到破坏导致大规模用户数据信息失窃这次Epsilon的失窃影响长远。

    youdao

  • The XSLT joins each theft with its associated location, vehicle, victim, and witness to present the data logically.

    XSLT连结盗窃事件及其关联位置车型失主证人符合逻辑地显示数据

    youdao

  • The threat today is not simply about vandalism but outright theft of confidential information, such as credit-card Numbers, social-security details, financial data, marketing plans and trade secrets.

    如今只是简单地破坏、进而更盗取泄漏保密信息信用卡号码身份证号码、金融数据营销计划商贸机密

    youdao

  • However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.

    然而数据质量低下敏感数据外泄外部恶意窃取问题随之而来,研究行之有效信息安全策略刻不容缓

    youdao

  • But the McAfee report is among the most thorough attempts yet to map the scale and range of such data-theft efforts.

    此次McAfee的报告,则历年所有此类数据盗窃报告程度范围描述最为彻底报告之一。

    youdao

  • Trojans are designed to cause loss or theft of computer data, and to destroy your system.

    木马程序目的造成损失被窃计算机数据破坏的系统。

    youdao

  • New regulations also may be needed to deal with special Internet crimes like the dissemination of computer virus, the theft of personal data stored on hard discs, and the like.

    我们可能需要新的规章制度应对特殊网络犯罪比如传播病毒盗窃硬盘个人数据其他类似犯罪行为。

    youdao

  • New regulations also may be needed to deal with special Internet crimes like the dissemination of computer virus, the theft of personal data stored on hard discs, and the like.

    我们可能需要新的规章制度应对特殊网络犯罪比如传播病毒盗窃硬盘个人数据其他类似犯罪行为。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定