Police sources yesterday downplayed the significance of the security breach.
警方昨天的消息对这次安全缺口的重要性轻描淡写。
Barely a day passes without news of another major computer security breach.
一天中,很少有能出现信息安全不被破坏的消息。
We have no indication that this is as a result of a new security breach.
我们认为,目前没有迹象显示这是一次新的安全泄露事故的结果。
Determine the potential for damage from a successful attack that results in a security breach.
确定攻击成功而导致安全性被破坏的可能性。
Before implementing your SOA to the outside world, decide how you will handle a security breach.
在对外部世界实现soa之前,应该决定您将如何处理安全漏洞。
Although you can take steps to decrease the risk of a security breach, your data is still in some danger.
虽然您可以分步来减少安全破坏的风险,但您的数据还是处于某种危险之中。
Keep in mind that if you ever see this message again, that is quite possibly a sign of a security breach.
请记住,如果您再次看到这个消息,则很可能表明安全性已被破坏。
The security breach was a major setback to the CIA, which has been expanding its presence in Afghanistan.
对于正在扩大在阿富汗的存在的中情局来说,这次暴露了安全隐患的事件是一个巨大的后退。
Pick up a newspaper on any given day, and you're likely to read about some sort of online security breach.
拿起任何一天的报纸,您都可能会看到关于网络安全破坏事件的报道。
I also predict at least one major security breach as a direct result of passing JSON data to the eval function.
我还预料将出现至少一次由于向eval函数传递JSON数据而造成的重大安全问题。
Thus, the "cost of security breach" may include very high indirect costs (such as, loss of investor confidence).
因此,“安全性被破坏的代价”可能包括非常高的间接代价(比如,失去投资者的信任)。
Rumours about a security breach at Kaspersky resulting in source code being leaked have been going around since 2009.
关于在卡巴斯基安全造成破坏的源代码被泄露的传言,2009年以来一直在进行左右。
While this bypasses the previous limitation, it introduces a security breach in case you want to build segregated networks.
虽然这个方法不会出现前面的限制问题,但是如果您希望创建分隔的网络,那么它会造成一个安全漏洞。
Thus, the "cost of security breach" might include some very high indirect costs (for example, loss of investor confidence).
因此,“安全性被破坏的代价”可能包括非常高昂的间接代价(比如,失去投资者的信任)。
By creating multiple lines of defense around your database, you can minimize the damage inflicted by a security breach.
借由在资料库周围筑起多道防线,您可以将安全性破坏所造成的损伤减至最少。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
When estimating the damage of a security breach, never forget that security breaches can cause users to lose faith in the system.
在估计安全性被破坏而造成的损失时,不要忘记安全性被破坏会导致系统用户对系统失去信心。
When estimating the damage of a security breach, never forget that security breaches can cause loss of faith in users of the system.
在估计安全性被破坏而造成的危害时,不要忘记安全性被破坏会导致系统用户对您的系统失去信心。
The startling security breach in September, when a pilot Internet vote system for the city of Washington, D. C. , was put online for a test.
九月,当华盛顿的一个网上投票试点项目被联机进行测试时,令人吃惊的安全漏洞事件发生了。
The startling security breach in September, when a pilot Internet vote system for the city of Washington, D. C. , was put online for a test.
九月,当华盛顿的一个网上投票试点项目被联机进行测试时,令人吃惊的安全漏洞事件发生了。
应用推荐