• Note: IACI is designed to help people solve the challenges of network security threat information.

    IACI旨在帮助人们解决网络安全威胁信息方面挑战

    youdao

  • The threat today is not simply about vandalism but outright theft of confidential information, such as credit-card Numbers, social-security details, financial data, marketing plans and trade secrets.

    如今只是简单地破坏、进而更盗取泄漏保密信息信用卡号码身份证号码、金融数据营销计划商贸机密

    youdao

  • TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.

    针对TEMPEST ATTACK计算机信息安全构成的威胁建立基本电磁辐射模型

    youdao

  • Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.

    电脑黑客活动形成重要威胁信息基础设施面临网络安全挑战

    youdao

  • The threat of greater function is to steal, modify or delete the computer for storing confidential information, and thus on the user's personal privacy and information security pose a serious threat.

    威胁性更大功能可以窃取修改删除计算机中存储机密信息从而用户个人隐私以及信息安全构成严重威胁

    youdao

  • In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.

    本文信息安全威胁、信息安全技术信息安全管理校园网信息安全进行探讨

    youdao

  • We mainly narrated have created the information security hidden danger and threat several kind of situations, inside this mainly introduced the human factor.

    我们主要讲述造成信息安全隐患威胁几种情况里面主要介绍了人为因素

    youdao

  • Sites in this category may pose a security threat to network resources or private information, and are blocked by your organization.

    类别中的站点可能构成安全威胁网络资源私人信息阻止组织的。

    youdao

  • The human factor also is poses the network information security threat the principal aspect.

    人为因素也是造成网络信息安全威胁主要方面

    youdao

  • This article briefs the hidden security threat for Information System of Manufacturing Enterprises, introduces main Information security Technologies, gives examples from the author's experience.

    阐述企业信息安全隐患主要安全技术阐述,结合本人工作的企业做案例分析。

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • Computer virus is a great threat to the security of information system.

    计算机病毒信息系统安全大敌之一。

    youdao

  • Computer virus is a great threat to the security of information system.

    计算机病毒信息系统安全大敌之一。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定