• 关注加固数字缺点一旦他们绕过攻击者就获得所有保护的数据

    The shortcoming in focusing on such sturdy digital walls is that once they are evaded, the attacker has access to all the protected data behind them.

    youdao

  • Jackson人们考虑数据跟踪的事,考虑过保护个人信息网上营销公司侵犯,虽然这些公司本质上自己没有任何防御措施

    People concerned about data tracking and protecting their personal data from being poached by online marketing firms are essentially defenseless as well, Jackson says.

    youdao

  • 本文中,谈到数据安全性机密性方面确保保护数据只能授权用户系统访问

    In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.

    youdao

  • 可以保证数据存储或者未经修改返回或者标识可疑”—非常类似于受保护HDD

    This ensures that, once stored, data is either returned unmodified, or is identified as being "suspect" - much like data on HDDs is safeguarded.

    youdao

  • 简单地,可恢复动作修改被保护数据任何事情。

    For our simple purposes, a recoverable action is anything that modifies protected data.

    youdao

  • 然而德国联邦数据保护机构主管彼得·沙尔谈到欧美之间隔阂夸大了。

    But regulators such as Peter Schaar, who heads Germany's federal data-protection agency, say the gulf is exaggerated.

    youdao

  • 事实上架直升机只受到了很小的损伤已经修复并准备进行重复测试——但是这次测试没有缓冲器保护的——这是为了获得用来做比较数据

    In fact, the helicopter was so lightly damaged that it is being repaired so that the test can be repeated-but this time without the cushion-to obtain comparable data.

    youdao

  • 通过清理数据忽略错误提交数据已经保护应用程序奠定良好的基础。

    By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.

    youdao

  • LotusScript设计线程安全意味着使用信号量保护数据结构从而保护装载每个LotusScript实例

    LotusScript is designed to be thread-safe, which means it USES semaphores to protect data structures so that each loaded instance of LotusScript is protected.

    youdao

  • 完善的安全功能能够保护APIs避免滥用确保用户数据隐私

    Sophisticated security capabilities to help protect the APIs from abuse and ensure the privacy of customer data.

    youdao

  • 为了确保实现HeadlessExecution同时防止. properties文件中的数据窥探使用技巧这些文件签入到一个保护储存库中

    A technique I've used to ensure Headless Execution while protecting the data in the.properties files from prying eyes is to check these files into a protected repository.

    youdao

  • 19世纪捕猎使其大部分毁灭,国际自然保护联盟(IUCN)数据19世纪40年代屠宰的露脊鲸就多达3万只。

    But hunting in the 19th century wiped out most of them, with up to30, 000 slaughtered in the 1840s alone, according to the InternationalUnion for the Conservation of Nature (IUCN).

    youdao

  • 有助于传输过程中保护备份数据意味着存储TivoliStorageManager服务器上的数据加密,因而不能恶意管理员读取。

    This helps secure backed-up data during transmission, and it means that the data stored on the Tivoli Storage Manager server is encrypted and thus is unreadable by any malicious administrators.

    youdao

  • 因为ZFS从不覆盖数据而是写入新的位置,所以可以保护较早数据(但是不重要情况下标记删除逆转磁盘空间)。

    Because ZFS never overwrites data but instead writes to a new location, older data can be preserved (but in the nominal case is marked for removal to converse disk space).

    youdao

  • 存储计算机里的数据保护起来

    The data stored in a computer can be protected.

    youdao

  • 包括内部审计管理目标不仅包括审计IS保护资产安全数据完整,且包括IS的有效性目标。

    It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.

    youdao

  • 如今指挥仪测量数据传送甲板保护绘图室内计算器

    Today the quantities measured at the director are sent to the computer in a protected plotting room below decks.

    youdao

  • 免于作为完整数据保护用户盗窃威胁滥用保障

    Frees the User from the Threat of Theft as Full Protection of Data from being Misused is guaranteed.

    youdao

  • 可以以后再次散列数据保护的进行比较

    At a later time, the data can be hashed again and compared to the protected value.

    youdao

  • 保护隐私触发远程手机删除所有私人数据

    Protect your privacy by triggering a remote wipe to delete all private data on your phone.

    youdao

  • 资源传送时,有可能使用某些加密方式保护资源。数据客户端控制的时候则有可能找到某种方法数据内容取某些资源。

    Whilst it is possible to use encryption to secure your Assets as they are being transmitted, once the data is in the hands of the client it is possible to find ways to grab the content from them.

    youdao

  • 即便数据受到密码保护某个进入你电脑的人还是“可以看到你的所有文件,如果它们没有加密的话”。

    Even if your data were password protected, someone who gained access to your computer "would have access to all your files if they were unencrypted. ""

    youdao

  • 数字水印技术通过保护多媒体数据加入透明的秘密信息达到标识鉴别控制隐藏信息作用。

    Digital watermarking techniques can be used for purposes such as label, authentication, control and dada hiding etc, by embedding a secret imperceptible signal directly into the data to be protected.

    youdao

  • 这样有助于保护宿主环境中的应用程序,避免站点地图数据另一应用程序加载

    This helps protect applications in a hosted environment from having their site-map data loaded by another application.

    youdao

  • 另外硬件机制可以内存部分区域提供保护防止代码数据其它恶意应用程序所篡改。

    Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.

    youdao

  • 规定通过一个输入端口传送良好数据保护,避免受到通过数据交换节点的其它输入端口传送的不良数据流所阻挡

    Provisions are made for well-behaved data flows conveyed via an input port to be protected against blocking from misbehaving data flows conveyed via other input ports of the data switching node.

    youdao

  • 没有完全记录那个事务不能保护数据完整性操作系统结束事务自动滚回。

    A transaction that is not fully recorded cannot be rolled back. To preserve database integrity, the operating system ended the transaction and rolled it back automatically.

    youdao

  • 数据保护公司AcronisInc 2013年7月份一项调查显示,21%的公司会在员工辞职或者解雇进行远程清除。

    Twenty-one percent of companies perform remote wipes when an employee quits or is terminated, according to a July 2013 survey by data protection firm Acronis Inc.

    youdao

  • 为了防止静止数据不法人士存取窃取修改通常采取一些安全措施数据加密分等级口令保护

    In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.

    youdao

  • 为了防止静止数据不法人士存取窃取修改通常采取一些安全措施数据加密分等级口令保护

    In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定