• 企业改善计算机安全操作系统

    Improve computer systems security operations for organizations.

    youdao

  • 通过观念信息分享计算机安全领域进步打下基础

    It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.

    youdao

  • 许多资深计算机安全研究人员认为这种战略”。

    Hard on the outside, with a soft chewy center, ” is the way many veteran computer security researchers think of such strategies.

    youdao

  • 保持计算机安全保护计算机免受威胁从未如此艰难。

    Keeping computers secure and protected against threats has never been harder.

    youdao

  • 尽管有了所有这些努力,但真正限制计算机安全可能人类本性

    For all those efforts, though, the real limits to computer security may lie in human nature.

    youdao

  • 介绍计算机安全检测方法个人计算机常用安全防护措施

    The paper presents methods of computer safety detection and common protection measures of private computers.

    youdao

  • 然而计算机安全研究人员他们作者多产印象深刻。

    Security researchers, however, said this week that they were impressed by the authors' productivity.

    youdao

  • 计算机安全技术公司McAfee已经发布了最新恶意网站地图报告

    McAfee, the computer security company, has released its latest "Mapping the Mal Web" report.

    youdao

  • :“我们正在经历计算机安全危机类似危机我们从未见过。”

    "We are living through a crisis in computer security the likes of which we've never seen," he says.

    youdao

  • 对于有效地计算机安全来说找到区别计算机更好检验方法至关重要。

    Finding better tests for distinguishing computers from humans is critical for effective computer security.

    youdao

  • 计算机安全中,处理操作后,消磁重写数据留在存储器中的数据。

    In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.

    youdao

  • 由于僵尸网络存在世界上一些最好计算机安全专家聚到一起阻止其带来的潜在破坏

    The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.

    youdao

  • 一些计算机安全专家提出异端思想密码需要”,需要频繁更换

    Some computer security experts are advancing the heretical thought that passwords might not need to be "strong," or changed constantly.

    youdao

  • 1月28日Kerviel滥用职权、违反计算机安全条例伪造文件开始接受正式调查

    On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.

    youdao

  • 如果曾经从事过计算机安全方面工作,则应该习惯于关于任何应用程序以下类型问题

    If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.

    youdao

  • “匿名”随后发现巴尔一些同事竟然计算机安全大忌多个账号使用相同密码

    Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts.

    youdao

  • 一个虚构的故事,然而的系统管理员/计算机安全生涯,这些事情却的的确确地发生

    This is a fictional account, yet just about everything that happens in it is something I've seen take place at one time or another during my sysadmin/computer security career.

    youdao

  • 不过计算机安全方面研究者指出公司拥有这方面的能力意味着他们或能够提供恶意服务。

    However, computer security researchers have noted that the capability could enable severe malicious activities.

    youdao

  • 那些报道计算机安全新闻网站转储文档进行深入挖掘,将HBGary巴尔当作了嘲弄的靶子。

    News sites that cover computer security have plumbed the document dump, turning HBGary and Barr into objects of ridicule.

    youdao

  • 论述普通四轮拖拉机上加装废气控制装置技术设计一种相配套的计算机安全监测系统

    Paper introduces a technique of the normal four-wheel tractor equipped with exhaust gas controlling device and designs a computer safety monitor system.

    youdao

  • 早期计算机安全兴趣实际上激发了计算机科学最初兴趣,并且那时起就一直关注的焦点。

    My early interest in system security is actually what sparked my initial interest in computer science and has been a focus of mine ever since.

    youdao

  • 苏黎世研究实验室,来自20多个国家的300位科学家主攻微电子学纳米技术计算机安全领域

    At its Zurich Research Laboratory around 300 scientists representing over 20 nationalities concentrate on areas such as microelectronics, nanotechnology and computer security.

    youdao

  • 这家芯片制造企业支付了60%的溢价,表明了对计算机安全重要性增强助长这些业务相关交易投机

    The chipmaker paid a 60 percent premium, underscoring the growing importance of computer security and fueling speculation that related deals may be in the works.

    youdao

  • 鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现计算机安全一种方法这种反应可能发生变化

    That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.

    youdao

  • 计算机安全研究协会2007调查发现50%的受访者过去的一年里有笔记本电脑其他移动设备偷。

    A 2007 survey by the Computer Security Institute found that 50 percent of respondents had a laptop or other mobile device sto-len in the past year.

    youdao

  • 一些电脑安全专家建议确保计算机安全最好方法编写出一种那么容易病毒蠕虫其他黑客伎俩破环软件

    Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.

    youdao

  • 神经装置速度进行革新,未来前景巨大,”华盛顿大学计算机安全专家TadayoshiKohno

    Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi Kohno of the University of Washington.

    youdao

  • 其他计算机安全公司报告了处方药广告垃圾邮件的减少虽然他们谨慎认为垃圾邮件是有波动的,而且经常会回到原来的高度

    Other computer security companies had reported similar reductions in prescription drug spam, although they cautioned that spam volumes were volatile and often spring back to previous high levels.

    youdao

  • 其他计算机安全公司报告了处方药广告垃圾邮件的减少虽然他们谨慎认为垃圾邮件是有波动的,而且经常会回到原来的高度

    Other computer security companies had reported similar reductions in prescription drug spam, although they cautioned that spam volumes were volatile and often spring back to previous high levels.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定