• Learn about social factors in computer security.

    了解计算机安全社会因素

    youdao

  • Hash algorithms are very important functions in computer security.

    散列算法计算机安全起着举足轻重作用

    youdao

  • One point to remember is that trust in computer security must be computationally verifiable.

    记住一点相信计算机安全一定能通过计算的方法验证

    youdao

  • In computer security, an attempt to gain access to a system by posing as an authorized user.

    计算机安全学中,试图装成个合法用户来获取系统访问权

    youdao

  • It is one of the important contents to distinguish legal users in computer security and secrecy.

    识别合法用户计算机安全保密重要内容

    youdao

  • The importance of secure operating systems in computer security iscausing more and more attention.

    安全操作系统计算机安全中的重要作用越来越引起人们的关注。

    youdao

  • "We are living through a crisis in computer security the likes of which we've never seen," he says.

    说:“我们正在经历计算机安全危机类似危机我们从未见过。”

    youdao

  • In computer security, a description of the characteristics of an entity to which access is controlled.

    计算机安全学中,一种存取受到控制实体特征描述

    youdao

  • In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.

    计算机安全学中,处理操作后,消磁重写数据留在存储器中的数据。

    youdao

  • In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.

    计算机安全用语,指用以检测入侵行动的种设备,通常是一块带有压力传感器橡皮乙烯垫子,用以检测入侵行动。

    youdao

  • In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.

    程序设计数据送入存储器工作寄存器。

    youdao

  • In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.

    计算机安全学中,由于软件硬件疏忽引起的错误这种错误躲过存取控制进程。

    youdao

  • If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.

    如果曾经从事过计算机安全方面工作,则应该习惯于关于任何应用程序以下类型问题

    youdao

  • In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.

    计算机安全学安全模型规则客体被置为不活动后,不能被访问直至被置为活动

    youdao

  • Virus detection is one of the most significant technologies in computer security field as well as the core technology in anti-virus software.

    病毒检测计算机安全领域重要技术之一反病毒技术核心

    youdao

  • In computer security, the performance of tests and evaluations in order to determine compliance with security specifications and requirements.

    计算机安全学确定安全性说明书要求是否一致测试评估

    youdao

  • In computer security, intelligible text or signals that have meaning and that can be read or acted upon without the application of any decryption.

    计算机保安技术领域,一种可以理解并意义的,不需要任何解密工作即可阅读它进行处理的文字信号

    youdao

  • In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information.

    计算机安全领域窥(shouldersurfing(站别人身后)越过肩膀别人操作获取信息的做法。

    youdao

  • In computer security, the characteristic of a resource that implies its value or importance, as well as its vulnerability to accidental or deliberate threat.

    计算机安全学中,一种资源偶然事件蓄意攻击含有价值重要性及其弱点特性

    youdao

  • Role-Based Trust Management System (RBTM) is an effective way to authorization solution in distributed credential management system, and is a hot field in Computer Security.

    基于角色信任委托管理系统分布式证书管理系统一个重要授权管理解决方案也是计算机安全领域研究热点

    youdao

  • In computer security, the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible.

    通信系统安全中,当可能发生扰乱企图扰乱系统安全情况时,能够跟踪某一个可能负有责任的特定人的特性。

    youdao

  • In computer security, a description of the type of authorized interactions a subject can have with an object. Permissions include: read, write, execute, add, modify and delete.

    计算机安全学主体一个客体合法作用类型,包括执行添加修改删除

    youdao

  • Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.

    简介由于黑客攻击最近新闻屡有报导,我们知道需要认真地对待计算机安全问题。

    youdao

  • Unless you have absolute confidence in the site that is asking for it, never give up your computer password, your social security number or your credit card information.

    除非完全信任某个网站,否则不要按照要求输入计算机密码社会保障号码或是信用卡信息

    youdao

  • For all those efforts, though, the real limits to computer security may lie in human nature.

    尽管有了所有这些努力,但真正限制计算机安全可能人类本性

    youdao

  • In computer science, it's sometimes said that everything can be solved with an extra layer, and at least for security, that stands true.

    计算机科学领域有时候可以额外一层解决所有问题,至少安全方面是这样

    youdao

  • No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg.

    好奇不过的心理学家格·内尔,他汉堡郊区一个小小的电脑安全公司

    youdao

  • No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg.

    好奇不过的心理学家格·内尔,他汉堡郊区一个小小的电脑安全公司

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定