• Police sources yesterday downplayed the significance of the security breach.

    警方昨天消息对这次安全缺口重要性轻描淡写

    《柯林斯英汉双解大词典》

  • Barely a day passes without news of another major computer security breach.

    中,很少有能出现信息安全被破坏消息

    youdao

  • We have no indication that this is as a result of a new security breach.

    我们认为,目前没有迹象显示一次新的安全泄露事故结果

    youdao

  • Determine the potential for damage from a successful attack that results in a security breach.

    确定攻击成功导致安全性被破坏可能性

    youdao

  • Before implementing your SOA to the outside world, decide how you will handle a security breach.

    对外部世界实现soa之前应该决定如何处理安全漏洞

    youdao

  • Although you can take steps to decrease the risk of a security breach, your data is still in some danger.

    虽然可以分步减少安全破坏风险,但数据还是处于某种危险之中

    youdao

  • Keep in mind that if you ever see this message again, that is quite possibly a sign of a security breach.

    记住如果再次看到这个消息可能表明安全性已被破坏

    youdao

  • The security breach was a major setback to the CIA, which has been expanding its presence in Afghanistan.

    对于正在扩大阿富汗的存在中情局来说,这次暴露安全隐患的事件一个巨大后退

    youdao

  • Pick up a newspaper on any given day, and you're likely to read about some sort of online security breach.

    任何一天报纸可能看到关于网络安全破坏事件的报道。

    youdao

  • I also predict at least one major security breach as a direct result of passing JSON data to the eval function.

    预料将出现至少一次由于eval函数传递JSON数据造成重大安全问题。

    youdao

  • Thus, the "cost of security breach" may include very high indirect costs (such as, loss of investor confidence).

    因此,“安全性被破坏代价可能包括非常间接代价(比如失去投资者信任)。

    youdao

  • Rumours about a security breach at Kaspersky resulting in source code being leaked have been going around since 2009.

    关于卡巴斯基安全造成破坏的源代码泄露传言,2009年以来一直进行左右。

    youdao

  • While this bypasses the previous limitation, it introduces a security breach in case you want to build segregated networks.

    虽然这个方法不会出现前面的限制问题,但是如果希望创建分隔的网络,那么会造成一个安全漏洞

    youdao

  • Thus, the "cost of security breach" might include some very high indirect costs (for example, loss of investor confidence).

    因此,“安全性被破坏代价可能包括非常高昂间接代价(比如失去投资者信任)。

    youdao

  • By creating multiple lines of defense around your database, you can minimize the damage inflicted by a security breach.

    借由资料库周围筑起道防线可以安全性破坏造成的损伤减至最少。

    youdao

  • At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.

    至少安全漏洞响应计划应该包括联系人列表初始响应团队基本指示

    youdao

  • When estimating the damage of a security breach, never forget that security breaches can cause users to lose faith in the system.

    估计安全性破坏而造成损失时,不要忘记安全性被破坏导致系统用户对系统失去信心

    youdao

  • When estimating the damage of a security breach, never forget that security breaches can cause loss of faith in users of the system.

    估计安全性破坏而造成危害时,不要忘记安全性被破坏导致系统用户您的系统失去信心

    youdao

  • The startling security breach in September, when a pilot Internet vote system for the city of Washington, D. C. , was put online for a test.

    九月华盛顿一个网上投票试点项目联机进行测试时,令人吃惊安全漏洞事件发生了

    youdao

  • The startling security breach in September, when a pilot Internet vote system for the city of Washington, D. C. , was put online for a test.

    九月华盛顿一个网上投票试点项目联机进行测试时,令人吃惊安全漏洞事件发生了

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定