• The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.

    这个模型篡改授权数据风险至了最低,因此服务器不用花费大量的时间验证数据了。

    youdao

  • Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.

    描述信息技术保全政策程序密码保护识别滥用不当访问篡改改变业务数据程序。

    youdao

  • A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data.

    必须识别滥用信息技术,包括不当进入干扰篡改商业数据体系

    youdao

  • Detecting script virus through one of its major features - tampering with users' registry data, the authors proposed an API HOOK-based registry table monitoring approach.

    利用恶意脚本程序重要特征(篡改用户注册数据)对进行监控提出种基于APIHOOK的注册监控方案

    youdao

  • Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.

    恶意篡改文件类型属性掩盖文件真实结构达到诱骗用户访问回避检测隐藏数据目的计算机犯罪行为常用的手段。

    youdao

  • Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.

    恶意篡改文件类型属性掩盖文件真实结构达到诱骗用户访问回避检测隐藏数据目的计算机犯罪行为常用的手段。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定