单词 | computer security |
释义 | 例句释义: 计算机安全性,电脑安全,电脑安全性,资讯安全 1. In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intend users. 在计算机安全方面,拒绝服务攻击(Dos攻击)是指试图用户无法使用计算机资源的攻击。 zhidao.baidu.com 2. When the bad guys change their tactics, most of the computer security industry needs a year or two to catch up. 当坏人改变策略时,大部分计算机安全业者需要用一到两年时间才能跟上变化。 www.suiniyi.com 3. In computer security, a description of the characteristics of an entity to which access is controlled. 在计算机安全学中,一种对存取受到控制的实体的特征的描述。 zhidao.baidu.com 4. No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg. 最好奇不过的是前心理学家朗格内尔,他在汉堡郊区开了一个小小的电脑安全公司。 www.bing.com 5. Richard Clayton, a computer-security expert at Cambridge University who has taken a close look at Phorm's systems, did not like what he saw. 剑桥大学计算机安全专家RichardClayton他在近距离观看了Phorm系统之后否决了自己所见到的一切。 boboan79.blog.163.com 6. I'm just as surprised by the poor computer security education offered to end-users at most companies. 我只是对大多数公司为终端用户提供的糟糕的计算机安全教育感到吃惊。 www.suiniyi.com 7. In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。 www.jukuu.com 8. Does the Company provide training to employees in documentation fraud detection and computer security controls? 工厂有书面程序给全体员工提供识别安全风险和计算机安全控制培训 wenku.baidu.com 9. Therefore, computer security issues, should be like every household as the fire alarm problems, take preventive measures. 因此计算机安全问题,应该像每家每户的防火防盗问题一样,做到防范于未然。 zhidao.baidu.com 10. Most computer security analysts did not cite a specific source of the attack on Twitter. 大多数计算机安全分析都没有提及针对Twitter的具体攻击来源。 www.bing.com 1. FIRST is striving to bridge the computer security gap between the countries of Asia and the rest of its global membership. FIRST正致力于缩小亚洲国家和全球其他国家在计算机安全领域的差距。 en.eol.cn 2. The deep hiding and detecting technology of malicious code has already become one of the research hotspots in computer security. 恶意代码的深层隐藏和检测技术已经成为当前计算机安全技术的一个研究热点。 degree.fzu.edu.cn 3. Graham Cluley, a computer security expert, likened the attack to "15 fat men trying to get through a revolving door at the same time. " 计算机安全专家GrahamCluley将此类攻击比喻为“15个胖子试图同时通过一个旋转门”。 www.bing.com 4. "Hard on the outside, with a soft chewy center, " is the way many veteran computer security researchers think of such strategies. “硬的外面,用软咬嚼中心”,就是许多资深的计算机安全研究人员认为这种战略。 dictsearch.appspot.com 5. The company provides computer security for U. S. government agencies and companies. NetWitness公司为美国政府机构和公司提供计算机安全服务。 chinese.wsj.com 6. In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions. 计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。 www.hotdic.com 7. Last week, however, accurate details of the flaw were briefly published online by a computer security firm, apparently by accident. 可是,漏洞的确切资料在上星期被一家电脑安全公司无意中泄漏于网上。 www.tianya.cn 8. All links except for the Government of Canada take you to the Computer Security Resource Centre area of the NIST site . 除“加拿大政府”链接外,其他所有链接都会带您进入NIST网站的计算机安全资源中心区域。 www.bing.com 9. It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information. 通过观念和信息的分享来为计算机安全领域的进步打下基础。 en.eol.cn 10. A lot of these problems could be solved if the computer industry took computer security seriously. 这些问题可以解决,如果计算机产业严肃地对待计算机安全。 blog.sina.com.cn 1. IT HAS been described as "amazing" , "groundbreaking" and "impressive" by computer-security specialists. 它被计算机安全专家称为“不可思议”、“史无前例”、“印象深刻”。 www.ecocn.org 2. FIPS 140-2 is the U. S. government computer security standard used to accredit cryptographic modules. FIPS140-2是用于授权数据加密模型的政府电脑安全性标准。 www.ibm.com 3. Things only started to go awry when the computer security experts told me this password would no longer do. 当电脑安全专家告诉我这个密码不行了的时候,事情才开始出了岔子。 www.ftchinese.com 4. The central challenge with computer security is determining the difference between normal activity and potentially harmful activity. 对计算机安全的主要挑战是确定正常行为与潜在的可疑行为之间的差异。 www.kancaimi.cn 5. Because of this, they're a treasure trove of personal information--and likely the next battleground for computer security. 正因为此,个人信息成为了无主之宝藏——就像电脑安全的下一处战场。 www.bing.com 6. They study Internet security vulnerabilities, handle computer security incidents, and publish security alerts. 他们研究因特网的安全弱点,处理计算机安全事故并发布安全警告。 www-128.ibm.com 7. in computer security , searching for telephone numbers and passwords by successively trying various combinations of numbers and letters. 在计算机安全学中,以连续地试验数字和字母的各种组合来搜索电话号码或口令的方法。 www.ichacha.net 8. As well as officialdom, its targets included computer-security and online-gaming companies regarded as pompous, complacent or hypocritical. 它的目标包括那些自大骄傲虚伪的计算机安全公司和在线游戏公司,还有官僚做派的组织。 www.ecocn.org 9. McAfee, the computer security firm, announced that it is buying Trust Digital, a smartphone management and security software company. 计算机安全公司McAfee宣布正在收购TrustDigital一家智能手机管理和安全软件公司。 www.bing.com 10. PC machine and virus are on guard: The universal of computer security, PC virus reaches his to be on guard. PC机的安全与病毒防范:计算机安全的一般概念,PC机病毒及其防范。 www.nwpu.net 1. In computer security, an intruder detector comprising a support with a matrix of foil or fine wire. 在计算机安全学中,一种入侵者检测器。 www.jukuu.com 2. The existence of the botnet has brought together some of the world's best computer security experts to prevent potential damage. 由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。 www.bing.com 3. Innovation in lab management involves computer security, computer automation and website management. 实验室创新管理包括:计算机安全管理、计算机自动化管理和计算机网站管理等。 www.ceps.com.tw 4. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. 检视违反电脑安全程序之行为并与违反者商谈以确保违反电脑安全程序之行为不再发生。 www.aboutcase.com.tw 5. This is the only site to include language data and will not cause your computer security failure, please rest assured! 这仅是在本站内载入语言数据,不会造成您的电脑出现安全故障,请放心! 4455.cc 6. The revelations were shared by the contractor at a meeting of computer security specialists. 该机构在一次电脑安全专家会议上分享了此成果。 hi.baidu.com 7. Program Access Controller is one the most effective and innovative computer security programs available. 程序访问控制是一个最有效和创新的计算机安全的程序。 www.jisuxz.com 8. Some computer security experts are advancing the heretical thought that passwords might not need to be "strong, " or changed constantly. 一些计算机安全专家正提出异端思想,即密码不需要“强”,也不需要频繁更换。 www.bugsboard.net 9. most computer security experts feel that people should not be afraid to use the Internet. 大多数电脑安全专家认为人们不应该因此而害怕因特网。 rrting.com 10. Mr. Gusev and SpamIt. com have been widely known in computer security circles, and he had lived openly in Moscow. Gusev和SpamIt.com在计算机安全届已是家喻户晓。而且他以前在莫斯科公开生活。 www.bing.com 1. Langner, the Hamburg computer security expert, said Stuxnet works like a sophisticated bank robbery. 汉堡电脑安全专家朗格尔说,Stuxnet就像计划周密的银行抢劫那样工作。 www.bing.com 2. Police arrested Omar Ramos-Lopez, 20, charging him with felony breach of computer security. 17日,警方以破坏电脑安全的罪名将他逮捕。 www.chinadaily.com.cn 3. Imagine the debate that might ensue if you stated that hackers do public service by finding and publicizing computer security weaknesses. 如果您说黑客通过寻找和公布计算机安全弱点来提供公共服务的话,设想随后的争论是什么样的。 www.ibm.com 4. US student Fred Cohen was behind the first documented virus that was created as an experiment in computer security. 美国学生弗雷德·科恩在进行计算机安全实验时,研制了第一个有记载的计算机病毒。 engnet.jiangnan.edu.cn 5. Finding better tests for distinguishing computers from humans is critical for effective computer security. 对于有效地计算机安全来说,找到区别计算机和人更好的检验方法至关重要。 bbs.chinadaily.com.cn 6. As the rapid development of the Internet, the threat to computer security form the malicious web page becomes severe. 随着互联网的快速发展,恶意网页所造成的危害也越来越大。 www.71155.com 7. File monitoring technology is an effective means to ensure computer security. 文件监控技术是保障计算机安全的有效手段。 lib.cqvip.com 8. Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。 www-128.ibm.com 9. Along with the computer technology rapid development, the computer security gradually becomes a latent huge question. 以计算机科技对计算机安全的迅速发展成为一个潜在地巨大的问题。 zhidao.baidu.com 10. In computer security, the overwriting of classified information on magnetic media such that the media may be reused. 在计算机安全学中,覆盖磁介质上的保密信息,使介质得以重新使用。 www.fane.cn 1. Developers may want to include a computer security expert as part of the design team for implementing an enterprise encryption scheme. 开发人员在实现企业加密计划时,设计小组中需要包括计算机安全专家。 www-128.ibm.com 2. Rik Ferguson, a senior advisor at the computer security firm Trend Micro, said gamers may have good reason for concern. 计算机安全公司TrendMicro高级顾问RikFerguson说游戏玩家很有理由担忧。 www.hxen.com 3. IT administrators and users must balance computer security, while enabling user productivity. 信息技术管理员和用户必须确保计算机安全,而同时又不影响到用户使用效率。 www.elanso.com 4. Mistakes by users are estimated to be responsible for as many as 60% of breaches of computer security. 据估算,高达60%的安全漏洞是由用户错误引起的。 woshao.com 5. Computer security specialist says spear phishing often provides the means for even broader attacks. 电脑安全专家称为鱼叉式网络钓鱼常常为更深的攻击提供指导。 blog.sina.com.cn 6. "They really showed how bad things are getting, " says Bruce Schneier, a renowned computer security expert. “文档确实表明了情况有多糟糕,”著名计算机安全专家布鲁斯·谢内尔(BruceSchneier)说道。 www.bing.com 7. If Green Dam is deployed in its current form, it will significantly weaken China's computer security. 如果绿坝以它现在的形式被部署,将会严重的削弱中国的计算机安全性。 dzh.mop.com 8. Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously. 简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。 www.ibm.com 9. In contrast, those hackers who engage themselves in computer security are called white hats. 相对的,那些致力于计算机安全的电脑黑客则被称为“白帽”。 www.chinadaily.com.cn 10. Graham Cluley, a technology consultant at computer security group Sophos, said that LulzSec had been "playing a dangerous game" . 计算机安全集团Sophos的技术顾问格雷厄姆?克鲁利(GrahamCluley)指出,LulzSec是在“玩一场危险的游戏”。 www.ftchinese.com 1. On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents. 1月28日Kerviel就滥用职权、违反计算机安全条例及伪造文件开始接受正式调查。 www.ecocn.org 2. 'Computer-security specialists are afraid to challenge Anonymous, ' said Mikko Hypponen, of computer-security firm F-Secure Corp. 电脑安全公司F-SecureCorp.的海波宁(MikkoHypponen)说,电脑安全专家害怕挑战“匿名者”。 c.wsj.com 3. They presented the findings at a computer security conference in Chicago. 他们在芝加哥的一次电脑安全会议上公布了这一发现。 bbs.cnesa.net 4. Then there's the need to bridge the gap between traditional computer security and research into industrial-control-system security. 还有就是需要将传统方式上电脑安全和研究与工业控制系统的安全联系起来。 dongxi.net 5. McAfee, the computer security company, has released its latest "Mapping the Mal Web" report. 计算机安全技术公司McAfee已经发布了最新的恶意网站地图报告。 www.bing.com 6. Barely a day passes without news of another major computer security breach. 一天中,很少有能出现信息安全不被破坏的消息。 www.bing.com 7. In computer security, the use of ultrasonic, microwave, infrared or photo- electric sensors to protect a defined area. 计算机安全学中,使用超声波、微波、红外线或光电探测器来保护某一区域。 www.hotdic.com 8. Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。 www.fehd.gov.hk 9. When these files are opened, they run in the context of the My Computer security zone. 当这些文件被打开时,它们在“我的电脑”安全区域的上下文中运行。 support.microsoft.com 10. There is no single solution to resolve computer security issues. 没有一个解决方案可以解决计算机的安全性问题。 www.tdict.com 1. Managers at some computer-security companies have even vowed not to hire Ledin's students. 一些计算机安全公司的经理已经发誓,不雇用Ledin的学生。 www.bing.com 2. News sites that cover computer security have plumbed the document dump, turning HBGary and Barr into objects of ridicule. 那些报道计算机安全的新闻网站对转储的文档进行深入挖掘,将HBGary与巴尔当作了嘲弄的靶子。 www.bing.com 3. In computer security a manually operated switch or device that activates an alarm. 计算机安全学中,指手工操纵的能发生警报的开关或设备。 www.jukuu.com 4. I am not joking: this is the conclusion of a recent report on the Web's most dangerous search terms from McAfee, a computer security firm. 我不是在开玩笑:这是一份由迈克菲电脑安全公司最近对“网上最危险字眼”一份报告进行分析得出的结论。 www.bing.com 5. This topic focuses on the study of port scanner to improve understanding of computer security. 本课题通过端口扫描器的研究来提高对计算机安全的认识。 www.lw678.com 6. There are good on-line collection on computer security, privacy, cryptography policy, and free speech. 该中心有关乎计算机安全、隐私、密码系统政策和言论自由的在线汇集。 zhidao.baidu.com 7. That's part of what is wrong with the computer security industry. 这就是计算机安全产业的部分失误之处。 www.suiniyi.com 8. What kind of attack do computer security experts fear most? 计算机安全专家最担心的攻击是什么? dongxi.net 9. If the government expands spying on the Internet without solving the underlying computer security problems, we are courting disaster. 假使政府不优先解决网路安全的基本问题,就直接扩大侦测网路,可能会招致灾难。 edba.ncl.edu.tw 10. Learn about social factors in computer security. 了解计算机安全的社会因素。 www.ibm.com 1. Cellular automata have a wide range of uses in circuit designing computer security etc. 细胞自动机在电路设计、计算机安全等领域有广泛的应用。 dictsearch.appspot.com 2. In computer security, the act of impeding or denying the use of system resources to user. 计算机安全技术中,阻止或拒绝用户使用系统资源的行为。 www.hotdic.com 3. But that approach isn't enough, according to Chris Wysopal, chief technology officer of computer-security firm Veracode. 但计算机安全公司Veracode的首席技术长ChrisWysopal说,做到这一步还不够。 chinese.wsj.com 4. For all those efforts, though, the real limits to computer security may lie in human nature. 尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。 www.bing.com 5. One point to remember is that trust in computer security must be computationally verifiable. 要记住的一点是相信计算机安全一定能通过计算的方法验证。 www.ibm.com 6. To be sure, computer security companies are in the business of not only finding but also marketing security risks. 为确保无误,电脑安全公司不单在做寻找但也再做销售安全风险的生意。 www.bing.com 7. In recently years, our government pays great attention to the research of computer security. 这几年,我国政府也对入侵检测研究投入了较大的重视。 www.fabiao.net 8. Symantec, the largest producer of computer-security software, rallied 3. 8 percent. 电脑安全软件制造商赛门铁克公司股价上涨3. www.bing.com 9. A good introduction to computer security. 对计算机安全的介绍。 www.ibm.com 10. As always with computer security, there are two things to remember. 伴随着电脑安全的问题,有两件事必须记住。 www.ecocn.org 1. How to resolve the computer security hidden trouble of business affairs user? 如何解决商务用户的电脑安全隐患? pjprimer.com 2. Since 2008, he has been doing independent computer security research and consulting. 2008年以来,他一直独立从事电脑安全研究和咨询工作。 c.wsj.com 3. This system is a kind of computer security protection software based on the USB key. 本文首先阐述了桌面保护系统的应用背景及重要实践意义; www.fabiao.net 4. The GAO found that, in 2008, 23 of 24 major agencies surveyed didn't have adequate computer security protections in place. 政府问责局发现,2008年接受调查的24家主要机构中,有23家没有设置适当的计算机安全防御。 www.bing.com 5. Last year, the Department of Defense's network security garnered the agency a 'D' on the Federal Computer Security Report Card. 去年,美国国防部电脑网络的安全水平被联邦电脑安全报告评定为‘D’级。 dream4ever.org 6. After the attacks, computer security experts from Nato, the EU, US and Israel arrived in the capital, Tallinn, to study its effects. 袭击事件发生后,计算机安全专家表示,由北约,欧盟,美国和以色列抵达首都塔林,以研究其效果。 www.qiyeku.com 7. This is my paper, published in last years Computer Security Applications Conference (ACSAC 2010). 这是本人的论文,发表在去年的计算机安全应用年会上(ACSAC2010)。 www.pudn.com 8. A shake-up in the hacker underground and fresh attacks suggest change is coming to computer security 地下黑客组织受到打击,新式攻击预示着计算机安全将有所改变 www.bing.com 9. In computer security, a variant of the Trojan horse in which malicious code is inserted to BE triggered later 在计算机安全学中,特洛伊木马程序的一个变种,其插入的恶性代码过一段时间将会发作。 dict.ebigear.com 10. Study of Random Sequence Generators of a Computer Security System 计算机安全系统中随机序列发生器的研究 service.ilib.cn 1. Computer security: The sounds of individual keystrokes can be distinguished, making it possible to eavesdrop on computer users 计算机安全:敲击键盘不同的键发生的声音是不同的,这就为窃听计算机开了一道后门。 blog.sina.com.cn 2. Information systems - Dictionary for information systems (computer security glossary) 信息系统.信息系统词典(计算机安全术语汇编) mapeng.net 3. Positive-case Oriented Self-organization Cluster Learning in Personalized Intelligent Computer Security Servers 个性化智能安全中面向正示例的自组织聚类学习 service.ilib.cn 4. In computer security, an error of omission or oversight In software or hardware that permits circumvention of the access control process 在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。 dict.ebigear.com 5. Technology of Computer Security Against Electromagnetic Information Leakage 计算机的电磁信息泄漏防护技术 ilib.cn 6. Annual Conference Computer Security Applications 计算机安全应用年会会刊 lib.ccec.edu.cn 7. Malicious BotNet and Its Illumination on Computer Security 僵尸网络及其启发 www.ilib.cn 8. United States National Computer Security Center, NCSC 正式得到美国国家计算机安全中心 mqc173.bokee.com 9. On Countermeasure of Computer Security Supervision from "Wen Bar" Management 从“网吧”管理谈计算机安全监察的对策 scholar.ilib.cn 10. Fulfillment of the Process Control Computer Security Framework 过程控制计算机系统安全架构的实现 service.ilib.cn 1. Fulfillment of the Process Control Computer Security Framework 过程控制计算机系统安全架构的实现 service.ilib.cn 2. Th annual computer security applications conference 年第十八届计算机安全应用年会 www.eisc.com.cn 3. Professional Committee of Computer Security of China Computer Federation 中国计算机学会计算机安全专业委员会 www.9181.cn 4. Trusted computing research on computer security problems 针对安全问题的可信计算研究 www.ilib.cn 5. The Exploration of the Computer Security Protection 计算机安全保护策略初探 www.ilib.cn 6. Computer Security training Exam Center SiChuan Province 四川省国家保密局保密培训基地 www.baike.com 7. Application of artificial immune system to computer security 人工免疫系统在计算机安全中的应用 ilib.cn 8. ACSAC: Annual Computer Security Applications Conference 计算机安全应用年会 wiki.networkdictionary.cn 9. Terminology for military computer security 军用计算机安全术语 phpget.com 10. undermine computer security and stability 破会计算机的安全与稳定性 wenku.baidu.com 1. undermine computer security and stability 破会计算机的安全与稳定性 wenku.baidu.com 2. A Probe into Computer Security Education from Outbreak of Computer Virus 从计算机病毒肆虐谈计算机安全教育 service.ilib.cn 3. Computer Security Booklet for Small Computer Systems 小型电脑系统的电脑保安小册子 www.info.gov.hk 4. Computer Security and Its Strategy 计算机安全与安全策略 www.ilib.cn 5. Research of computer security quantitative evaluation based on artificial neural networks 基于人工神经网络的主机安全量化评估研究 www.ilib.cn 6. European Symposium on Research in Computer Security 欧洲计算机安全研究讨论会 www.shiyanhospital.com 7. Applications and prospects of AIS in computer security fields AIS在计算机安全领域的应用与展望 service.ilib.cn 8. The application of immunology to computer Security 免疫学在计算机安全中的应用 www.ilib.cn 9. Computer Security Policy and Practice of Playout System 播出系统计算机安全策略和实践 www.ilib.cn 10. Introduction to Cryptography and Computer Security 密码学和计算机安全简介计算基因组学 blog.sina.com.cn 1. Introduction to Cryptography and Computer Security 密码学和计算机安全简介计算基因组学 blog.sina.com.cn 2. Non-Interference Models in Computer Security 计算机安全中的无干扰模型 scholar.ilib.cn 3. Working experience in computer security company is a plus 有计算机安全公司工作经验者有限考虑 www.barracudanetworks.com.cn 4. Computer Security Systems and Planning 计算机安全计划系统 www.gsdedu.com 5. Counter measures For Computer Security 计算机的安全及防范措施 ilib.com.cn 6. Setting up computer security defense system 计算机安全防范体系的构建 www.ilib.cn 7. Technical Panel on Computer Security; 计算机安全技术小组; www.sinobay.com 8. A Computer Security Model of Imitated Nature Immune 一种仿生物免疫的计算机安全系统模型 ilib.cn 9. Typical Models of Computer Security 计算机安全中的经典模型 www.ilib.cn 10. The Revelation of Computer Security 计算机安全知识启示录 www.ilib.cn 1. On Computer Security Prevention in Local Net 浅谈局域网中的计算机安全防范 www.ilib.cn 2. A Computer Security Risk Analysis Model Based on Graph Rewriting System 一种基于图重写的计算机安全风险分析系统 www.ilib.cn 3. Task Force on Computer Security 旗下的计算机安全特别部队 sonata.iscas.ac.cn 4. A Computer Security Immunology System Model Based on Multi-Agent 一个基于Multi-Agent的计算机安全免疫系统模型 dict.bioon.com 5. Computer security analysis model based on fault tree 基于故障树的计算机安全性分析模型 service.ilib.cn 6. Optic Network in The Development of Computer Security 计算机安全发展中的光网络应用 2006.cert.org.cn 7. Reflections on Setting up Computer Security System in Our Country 我国计算机安全体系建设的思考 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。