Learn about social factors in computer security.
了解计算机安全的社会因素。
Hash algorithms are very important functions in computer security.
散列算法对计算机安全起着举足轻重的作用。
One point to remember is that trust in computer security must be computationally verifiable.
要记住的一点是相信计算机安全一定能通过计算的方法验证。
In computer security, an attempt to gain access to a system by posing as an authorized user.
在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
It is one of the important contents to distinguish legal users in computer security and secrecy.
识别合法用户是计算机安全保密的一项重要内容。
The importance of secure operating systems in computer security iscausing more and more attention.
安全操作系统在计算机安全中的重要作用越来越引起人们的关注。
"We are living through a crisis in computer security the likes of which we've never seen," he says.
他说:“我们正在经历一场计算机安全危机,类似危机我们从未见过。”
In computer security, a description of the characteristics of an entity to which access is controlled.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
在计算机安全学中,经处理操作后,消磁或重写数据前剩留在存储器中的数据。
In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.
计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
在程序设计中,把数据送入存储器或工作寄存器。
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。
If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.
如果您曾经从事过计算机安全方面的工作,则应该习惯于关于任何应用程序的以下类型的问题。
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
Virus detection is one of the most significant technologies in computer security field as well as the core technology in anti-virus software.
病毒检测是计算机安全领域的重要技术之一,是反病毒技术的核心。
In computer security, the performance of tests and evaluations in order to determine compliance with security specifications and requirements.
在计算机安全学中,确定与安全性说明书及要求是否一致的测试及评估。
In computer security, intelligible text or signals that have meaning and that can be read or acted upon without the application of any decryption.
在计算机保安技术领域,一种可以被理解并有意义的,不需要经任何解密工作即可阅读并对它进行处理的文字或信号。
In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information.
在计算机安全领域,肩窥(shouldersurfing)指(站在别人身后)越过肩膀探看别人操作获取信息的做法。
In computer security, the characteristic of a resource that implies its value or importance, as well as its vulnerability to accidental or deliberate threat.
在计算机安全学中,一种资源对偶然事件或蓄意攻击含有其价值、重要性及其弱点的特性。
Role-Based Trust Management System (RBTM) is an effective way to authorization solution in distributed credential management system, and is a hot field in Computer Security.
基于角色的信任委托管理系统是分布式证书管理系统中一个重要的授权管理解决方案,也是计算机安全领域的研究热点。
In computer security, the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible.
在通信系统安全中,当可能发生扰乱或有企图扰乱系统安全的情况时,能够跟踪到某一个可能负有责任的特定人的特性。
In computer security, a description of the type of authorized interactions a subject can have with an object. Permissions include: read, write, execute, add, modify and delete.
在计算机安全学中,一个主体对一个客体的合法作用类型,包括读、写、执行、添加、修改和删除。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Unless you have absolute confidence in the site that is asking for it, never give up your computer password, your social security number or your credit card information.
除非你完全信任某个网站,否则不要按照其要求输入你的计算机密码、社会保障号码或是信用卡信息。
For all those efforts, though, the real limits to computer security may lie in human nature.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
In computer science, it's sometimes said that everything can be solved with an extra layer, and at least for security, that stands true.
在计算机科学领域,有时候可以用额外的一层解决所有问题,至少在安全方面是这样。
No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg.
最好奇不过的是前心理学家朗格·内尔,他在汉堡郊区开了一个小小的电脑安全公司。
No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg.
最好奇不过的是前心理学家朗格·内尔,他在汉堡郊区开了一个小小的电脑安全公司。
应用推荐