青年中文青年中文

computer security的意思

computer security中文翻譯:

[計]計算機安全

相似詞語短語

computer───n.計算機;電腦;電子計算機

security───n.安全,安全性;保證;證券;抵押品;adj.安全的;保安的;保密的

security zone───安全地帶

security control───安全技術;保安措施;安全技術,安全控制,保安措施

security features───安全特征(securityfeature的復數)

security officers───安全官員;安全人員

distressed security───危難證券

cumic security───cumic安全

it security───it安全

雙語使用場景

A good introduction to computer security.───對計算機安全的介紹。

One option is to call computer security experts.───選擇之一是請求計算機安全專家的幫助。

Learn about social factors in computer security.───了解計算機安全的社會因素。

In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intend users.───在計算機安全方面,拒絕服務攻擊(Dos攻擊)是指試圖用戶無法使用計算機資源的攻擊。

When the bad guys change their tactics, most of the computer security industry needs a year or two to catch up.───當壞人改變策略時,大部分計算機安全業者需要用一到兩年時間才能跟上變化。

In computer security, a description of the characteristics of an entity to which access is controlled.───在計算機安全學中,一種對存取受到控制的實體的特征的描述。

No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg.───最好奇不過的是前心理學家朗格內爾,他在漢堡郊區開了一個小小的電腦安全公司。

Richard Clayton, a computer-security expert at Cambridge University who has taken a close look at Phorm's systems, did not like what he saw.───劍橋大學計算機安全專家RichardClayton他在近距離觀看了Phorm系統之后否決了自己所見到的一切。

I'm just as surprised by the poor computer security education offered to end-users at most companies.───我只是對大多數公司為終端用戶提供的糟糕的計算機安全教育感到吃驚。

英語使用場景

Hash algorithms are very important functions in computer security.

Barclays has specialists on computer security, hacking and computer viruses - programmes which replicate themselves and can cause enormous damage.

The techniques he used to breach computer security systems remain available to others.

Computer security systems will be designed by independent technicians.

Many managers tend to view computer security and computer crime as technological problems that technicians can solve.

In computer security, the act of impeding or denying the use of system resources to user.

In computer security, the quality or state that enables violations or attempted violations of ADP system security to be traced to individuals who may then be held responsible.

Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks.

The Computer Security Institute, which conducted the survey, said the losses were caused by industrial espionage, hacking and fraud.