The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data.
必须有识别滥用信息技术,包括不当进入、干扰或篡改商业数据的体系。
Detecting script virus through one of its major features - tampering with users' registry data, the authors proposed an API HOOK-based registry table monitoring approach.
利用恶意脚本程序的一个重要特征(篡改用户注册表数据)对其进行监控,提出了一种基于APIHOOK的注册表监控方案。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
应用推荐