网站首页  词典首页

请输入您要查询的英文单词:

 

单词 unauthorized access
释义

unauthorized access

美 
英 
  • un.越权存取
  • 网络非授权访问;未授权访问;未经允许进入
un.
1.
越权存取

例句

释义:
1.
This form of unauthorized access is often called patterns of non-cooperative communications.
这种无授权接入通信形式,称为非协作式通信。
www.fabiao.net
2.
Used by a company that wants to host its own internet services without sacrificing unauthorized access to its private network.
被想主持自己的因特网服务,同时又想捍卫其私有网络免受非法访问的公司所使用。
dictsearch.appspot.com
3.
The test result shows that this model can effectively stop the unauthorized access and protect data from destructing or stealing.
测试结果表明,该模型可以有效地阻止进程的非法访问而确保数据不被窃取或破坏。
www.ceps.com.tw
4.
Unauthorized access to sensitive files out of the company after not view the contents.
非授权获得的敏感文件在带出公司后也无法查看其中的内容。
goabroad.zhishi.sohu.com
5.
Password security at the workbook level uses advanced encryption to help protect your workbook from unauthorized access .
工作簿级别的密码安全使用高级加密来帮助保护工作簿免受未授权的访问。
www.bing.com
6.
It is one of the widely used methods to prohibit unauthorized access to the data over the network.
这种方法广泛用于阻止通过网络对数据进行未授权访问。
www.ibm.com
7.
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
www.ibm.com
8.
check-in is completed, we will not knock on the door or unauthorized access to your room if Outeshuqingkuang will contact you in advance.
入住手续办完后,我们不会擅自敲门或者进入到您的房间;如遇特殊情况,将事先与您联系。
zhidao.baidu.com
9.
Any unauthorized access of a computer and its data, constitutes a breach of a computer system.
所有未经授权的对计算机及其数据的访问,都可能造成计算机系统的泄露。
www.bing.com
10.
Password protection allows you to hide your sensitive data from unauthorized access.
密码保护允许您隐藏你的未经授权的访问敏感数据。
bbs.dospy.com
1.
Protecting information on a system is always a critical task from unauthorized access.
保护系统上的信息不受未经授权的访问一直都是一个关键任务。
www.ibm.com
2.
You did not specify a password. You should use passwords to prevent unauthorized access to your files.
没有指定密码。您可以使用密码来防止您的文件被未授权的用户访问。
www.fan6.net
3.
Open and view the workbook This password is encrypted to help protect your data from unauthorized access .
我们强烈建议明确将这些参数值改为合法的组名,以便防止未授权的访问。
www.bing.com
4.
In general, information security means protecting information from unauthorized access, disclosure, or destruction.
一般而言,资讯安全意指保护资讯不被未经授权的程序窃取、洩漏或破坏。
www.usa-degree.com
5.
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
www.ibm.com
6.
The TAMOS centralized policy management technique prevents unauthorized access, and monitors accesses to sensitive data and resources.
TAMOS集中策略管理技术可防止未授权访问并监控对敏感数据和资源的访问。
www.ibm.com
7.
PIN-controlled security helps prevent unauthorized access to your sensitive UPS delivery information.
由PIN控制的安全性帮助防止对您的敏感的UPS递送信息的未授权的访问。
www.tdict.com
8.
Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.
大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。
www-128.ibm.com
9.
You can take advantage of several security options in the WebSphere Application Server admin console to secure it from unauthorized access.
您可以利用WebSphereApplicationServer管理控制台中的几个安全性选项对其进行保护,使之免受越权的访问行为。
www-128.ibm.com
10.
Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.
这些专业人员专门处理安全问题,能够提供不同寻常的建议来保护数据避免未经授权的访问。
www.ibm.com
1.
The factory has internal security necessary to protect from unauthorized access?
工厂是否有防止未授权进入的必要的内部安全措施?
www.e2shop.cn
2.
Hackers are computer hobbyists for whom unauthorized access is an intellectual diversion.
黑客是计算机爱好者的人未经授权的访问是一个知识转移。
zhidao.baidu.com
3.
Is there a system recording, reviewing and periodically investigating the invalid password attempts and unauthorized access to files?
有系统定期对无效密码访问和未授权文件访问的记录进行评估,维护和调查?。
bbs.fobshanghai.com
4.
Furthermore, we take steps to protect the customer data we collect from unauthorized access, disclosure, alteration, or destruction.
而且,我们将采取措施以防止我们所收集的客户数据遭受未经授权的访问、暴露、修改或破坏。
www.securdisc.net
5.
The security of the site must be adequate to detect or prevent unauthorized access.
该网站的安全必须得到足够的,以发现或防止未经授权的访问。
blog.sina.com.cn
6.
Whenever information is sent over a network, the possibility of unauthorized access exists.
每当信息通过网络发送,总是存在越权访问的可能性。
www.kancaimi.cn
7.
Access Controls: Unauthorized access to the shipping, loading dock and cargo areas should be prohibited.
访问控制:未经授权进入航运,装卸码头和货物的地方应予以禁止。
zhidao.baidu.com
8.
For optimal security, you should use a password to help safeguard the workbook file itself from unauthorized access.
为了获得最佳的安全性,您应该使用密码来保护工作簿文件本身,使之免遭未经授权的访问。
office.microsoft.com
9.
Valuable assets, including intellectual assets and information, are protected from unauthorized access or use.
有价值的资产,包括知识产权和信息,非经授权不得使用。
www.aweto.com
10.
Library developers must protect their code from unauthorized access from partially trusted applications.
程式库开发人员必须保护程式码,防止部分受信任应用程式未经授权对其进行存取。
technet.microsoft.com
1.
Vulnerability describes how well-protected your computer is from another network, and the potential for someone to gain unauthorized access.
漏洞描述如何在网络中保护好您的系统,以及防止潜在的未经授权的访问。
dictsearch.appspot.com
2.
Data must be protected from unauthorized access and modification.
防止对数据进行未授权的访问和更改。
www.ibm.com
3.
Do physical barriers and deterrents for cargo handling and storage facilities that guard against unauthorized access?
有障碍物或屏障可防止非法进入货物的处理和存放区域?。
www.6sq.net
4.
To help protect your account against unauthorized access, we may need an alternate way to verify your identity.
为了帮助保护您的帐户对未经授权的访问,我们可能需要另一种方法来验证您的身份。
08translation.cn
5.
We treat our data as assets that must be protected against loss and unauthorized access .
我们将客户资料视为资产,致力保护以防遗失,并只有经授权人员才可使用。
www.bing.com
6.
Acting as a Policy Enforcement Point, to protect against unauthorized access.
充当策略强制点,以抵御未经授权的访问。
www.ibm.com
7.
There emerges a large number of pirated software. Illegal use, copy, and unauthorized access to software, etc.
非法使用、复制,未经授权的访问等严重损害了软件权利人及权利相关人的利益。
202.119.108.211
8.
It helps prevent unauthorized access to the corporate Web services, but can disable access for legitimate clients.
它有助于防止对企业Web服务进行未经授权的访问,但也可能拒绝合法用户的访问。
www-128.ibm.com
9.
Select this option to prevent unauthorized access to your computer 's Internet connection, and to the network if the connection is shared.
选择此选项来禁止通过你的Internet连接对你的计算机和共享的网络的未授权的访问。
angel.w15.5tom.cn
10.
The information sent over these networks is encrypted, which can help protect your computer from unauthorized access.
通过这些网络发送的信息已经过加密,这样可以帮助防止计算机受到未经授权的访问。
windowshelp.microsoft.com
1.
The information sent over such networks is encrypted, which can help protect your computer from unauthorized access.
通过此类网络发送的信息是经过加密的信息,这有助于保护计算机免受未经授权的访问。
windowshelp.microsoft.com
2.
Unauthorized access to licenses is prevented by a logon dialog and user administration.
登录对话框和用户管理可以防止对许可证的未授权访问。
www.ad.siemens.com.cn
3.
Are there procedures in place to restrict, detect and report unauthorized access to shipping, storage and loading area?
工厂有程序规定如何限制,发现和上报未经许可进入储存,装运区域的情况吗?。
www.6sq.net
4.
Besides availability, you need to ensure that your data is properly secured, since you would not want unauthorized access to sensitive data.
除了可用性之外,您还需要保证数据得到适当的保护,因为您不能让未经授权的人访问到敏感的数据。
www-128.ibm.com
5.
Are containers parked in a secure, well lit area and monitored for unauthorized access?
是否货柜都停放在安全、有充份照明及良好监控以避免非法入侵的地方?
www.china-coc.org
6.
instability, and allowing unauthorized access to accounts, computers, and.
不安定,而且允许未经认可的接触帐户,计算机,和。
zhidao.baidu.com
7.
You should never show the user his own credit card number, in case someone manages to get unauthorized access.
您应该永远不要向用户显示其自己的信用卡号,以免有人设法获取未授权的访问。
www-128.ibm.com
8.
You configure Websphere Portal to avoid unauthorized access by using an LDAP directory for authentication.
可以配置WebspherePortal来通过使用LDAP目录进行身份验证,从而避免非授权访问。
www.ibm.com
9.
Access control by more powerful technology to reduce unauthorized access to use its information risks.
通过更强大的访问控制技术,减少非授权访问利用其信息的风险。
www.helicoptersbuyers.com
10.
Does the facility have physical barriers and deterrents that guard against unauthorized access?
工厂是否设置了围墙和派驻保安?
www.super-net.cn
1.
The Windows Firewall system prevents unauthorized access to computer resources.
Windows防火墙系统可防止对计算机资源进行未经授权的访问。
msdn2.microsoft.com
2.
Confidentiality: Ensuring unauthorized access to information will be denied.
机密性:保证对信息的未授权访问会得到拒绝。
bbs.51testing.com
3.
Continuous monitoring assists in preventing unauthorized access to the Web server.
持续监控有助于阻止未授权访问Web服务器。
www.ibm.com
4.
The AirDefense sensors protect the Army's local area networks as well as wireless networks from unauthorized access.
这些传感器将保护陆军局域网以及无线网络,防止未授权访问。
www.etiri.com.cn
5.
You can protect your pictures from unauthorized access with password protected categories.
你可以给你的照片目录设置密码,防止不合法的访问。
fushanling.blogspot.com
6.
A firewall can help prevent unauthorized access to your computer from the outside world.
防火墙可以阻止外部网络对您的计算机进行未授权的访问。
www.ibm.com
7.
The factory has adequate physical security and barriers to guard against unauthorized access.
A工厂是否有足够的实体安全及屏障来阻止未经授权的进出?
bbs.foodmate.net
8.
A Demilitarized Zone enables further protection from malicious or unauthorized access attempts from outside the Enterprise Secure Zone.
隔离区允许进一步抵御来自企业安全区之外的恶意或未经授权的访问尝试。
www.ibm.com
9.
A firewall prevents unauthorized access to data on servers that reside behind the firewall.
防火墙阻止未经授权的用户访问位于防火墙后面的服务器上的数据。
technet.microsoft.com
10.
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
dongxi.net
1.
First, it reduces the risk of unauthorized access to the MobiLink synchronization server.
第一,降低了未经授权访问MobiLink同步服务器的风险。
www.ianywhere.com
2.
Do personnel in your organization understand the minimum criteria for unauthorized access and goods tampering?
在你的组织人员了解货物未经授权的访问和篡改的最低标准是什么?
zhidao.baidu.com
3.
If you restrict access to tables or columns, the database will return an access denied error for all unauthorized access.
如果限制访问表或列,数据库将对未经授权的所有访问返回一个拒绝访问错误。
msdn2.microsoft.com
4.
IRM helps prevent the sensitive information itself from unauthorized access and reuse.
IRM有助于防止对敏感信息本身进行未经授权的访问和再使用。
office.microsoft.com
5.
Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.
对特定页面的访问使用J2EE声明性和程序性安全来限制,以禁止对页面的非授权访问。
www.ibm.com
6.
For this reason, unauthorized access to sensitive data is a security risk that you must address.
出于这个原因,对敏感数据的未授权访问是您必须解决的安全隐患。
msdn2.microsoft.com
7.
Do personnel in your organization understand your response plan for unauthorized access and goods tampering?
在你的组织工作人员了解您对未经授权的访问和货物篡改应对计划?
zhidao.baidu.com
8.
He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.
他被指控利用25个身份盗窃、非法访问和非法损坏一个受保护的计算机。
www.bing.com
9.
These days, executives are more concerned than ever about unauthorized access to data entrusted to their organizations.
最近,高管们常常担忧委托给他们的数据的未授权访问。
www.ibm.com
10.
We're going to install a firewall to protect your server from unauthorized access.
我们会安装一个防火墙来保护你的服务器,阻止那些未授权的访问。
www.bing.com
1.
We maintain strict security standards and procedures to prevent unauthorized access to information about you.
我们设有严格的安全标准和程序,以防止未经授权访问您的信息。
www.94493.com
2.
Protect quality records from unauthorized access.
防止质量记录被非授权人员查阅。
www.jukuu.com
3.
The security plans and requirements for each type of data so that the grid application can get access while preventing unauthorized access.
每一种类型的数据的安全规划与需求,这样网格应用程序才能访问到数据,同时阻止非授权访问。
www-128.ibm.com
4.
Does the facility have procedures for secure storage of empty and full containers to prevent unauthorized access?
工厂是否有空的或是满的货柜的安全装载状况程序记录以防止非法装载吗?
dictsearch.appspot.com
5.
The three were charged with gaining unauthorized access to computers, computer fraud and conspiracy to commit wire fraud.
这三人被指控未经授权访问电脑、电脑欺诈、合谋进行电子交易欺诈。
www.bing.com
6.
IT organizations can also protect the content in this centrally managed repository from unauthorized access.
IT组织也可以防止未经授权就访问此集中管理的存储库中的内容。
office.microsoft.com
7.
How is the information protected from unauthorized access?
如何保护信息不被未经授权的访问?
wiki.ubuntu.org.cn
8.
To reduce the possibility of unauthorized access to sensitive information, you may want to encrypt your data.
为了减少对敏感信息进行未授权访问的可能性,您可能需要加密数据。
msdn2.microsoft.com
9.
The process of encoding data to prevent unauthorized access, especially during transmission.
对数据进行编码以防止越权访问的过程或方法,尤其是在数据传输过程中。
wiki.mycreative.com.cn
10.
Computer Systems controls are in place to prevent unauthorized access.
是否建立计算机系统的管制以防止未经授权的进入?
www.e2shop.cn
1.
How does your company store empty and full containers to prevent unauthorized access?
贵公司如何储存空集装箱及货满集装箱,以防止未经授权的接触?
zhidao.baidu.com
2.
It is also the challenge of preventing unauthorized access from hackers and fraudsters.
而对于黑客或欺诈者防止未经授权的访问也是挑战。
www.cto360.com
3.
Do you review security measures on a periodic basis to prevent unauthorized access to facilities, equipment, document processes and cargo?
你以周期的方式检讨安全措施避免对设备,仪器,文件程序和货物的未经认可的通路吗?。
zhidao.baidu.com
4.
This is the screen where you create a password if you want to protect this computer from unauthorized access.
如果要保护计算机,防止未授权的用户访问,您可在此屏幕上创建密码。
www.drados.com
5.
Automatic time-out is valuable because it helps protect users'accounts from unauthorized access.
自动超时非常有用,因为可以避免未经授权访问用户帐户。
technet.microsoft.com
6.
It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.
它也可以报告对服务器的未授权的访问尝试,因此它对于审核LotusDomino服务器的安全性是一个有用的工具。
www.ibm.com
7.
Using this mechanism, we can protect Web resources from unauthorized access.
使用该机制,可以防止未授权用户访问Web资源。
www-128.ibm.com
8.
Your e-mail account has been temporarily disabled because of unauthorized access.
由于您的电子邮件帐号被非法访问,所以被暂时禁用
www.iselong.com
9.
SQL Server can operate transparently with Proxy Server to prevent unauthorized access to your internal network.
因代理服务器能阻止对内网的非法访问,SQL服务器可透明运行。
bbs.translators.com.cn
10.
This should help prevent unauthorized access to your data, as the password will be required to open the workbook.
这样,由于打开工作簿需要提供密码,从而可使数据免遭未经授权的访问。
office.microsoft.com
1.
Listing 4 shows an example of how to secure the confidential information from unauthorized access using bluegroups.
清单4演示了如何使用bluegroups禁止未授权用户访问机密信息。
www.ibm.com
2.
Do you have procedures for the proper storage of empty and full containers to prevent unauthorized access?
你为空的东西和完整的容器适当的储藏有程序避免未经认可的通路吗?。
zhidao.baidu.com
3.
Unauthorized access to fire alarm equipment, alarm system failure once the cause, will hold the responsibility of the parties;
未经允许,禁止接触消防警报设备,一旦造成警报系统失灵,将追究当事人的责任;
goabroad.zhishi.sohu.com
4.
Any genetic information in their possession is adequately protected against unauthorized access, misinterpretation or misuse;
所掌握的任何遗传信息都应严格保密,避免越权存取、错误解释或使用;
godlex.blog.163.com
5.
professional electronic access control, advanced database management, from unauthorized access;
专业电子门禁,先进的数据库管理,未经授权不得进出;
bbs.translators.com.cn
6.
Nonvolatile memory and virtuallzationand hardware-based virtual OS isolate critical applications and information from unauthorized access
非易失性内存与虚拟化及基于硬件的虚拟操作系统隔离关键应用和信息,使其免遭非法访问
www.prcidf.com.cn
7.
Unauthorized access to information systems
未经授权而进入信息系统软件版权
www.wenkoo.cn
8.
Any authorized or unauthorized access or use may be monitored and can
任何授权或未授权访问或使用可以被监视和即可
wenku.baidu.com
9.
Protecting your project from unauthorized access
防止对项目进行未经授权的访问
office.microsoft.com
10.
MS05-004: ASP. NET path validation vulnerability could allow unauthorized access
MS05-004:ASP.NET路径验证漏洞可能允许未经授权的访问
support.microsoft.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/26 15:29:43