• Changing a single parameter may give the user unauthorized access.

    改变一个单一参数可能用户未授权访问

    youdao

  • Locked flash drive will protect your data from unauthorized access.

    挂锁优盘可以防止数据越权存取

    youdao

  • Data must be protected from unauthorized access and modification.

    防止数据进行未授权的访问更改。

    youdao

  • You should also log any attempted unauthorized access to the system.

    应该记录任何不成功系统登录

    youdao

  • Acting as a Policy Enforcement Point, to protect against unauthorized access.

    充当策略强制抵御未经授权访问

    youdao

  • Unauthorized accessGaining unauthorized access to a Web service or its data.

    未经授权访问——获得Web服务数据的未经授权的访问。

    youdao

  • Unauthorized access using techniques such as dictionary attack and falsified message.

    非授权访问,实施攻击技术包括目录攻击伪造消息

    youdao

  • Sites should take reasonable steps to protect personal data from unauthorized access.

    网站采取合理步骤保护个人资料,使其免受未经授权的取得和使用。

    youdao

  • Protecting information on a system is always a critical task from unauthorized access.

    保护系统信息不受未经授权的访问一直都一个关键任务

    youdao

  • It may be necessary to secure event payloads from unauthorized access using access control.

    可能需要使用访问控制保护事件负载免受未经授权的访问。

    youdao

  • It is also the challenge of preventing unauthorized access from hackers and fraudsters.

    而对于黑客欺诈者防止未经授权访问也是挑战

    youdao

  • Any unauthorized access of a computer and its data, constitutes a breach of a computer system.

    所有未经授权计算机及其数据的访问,都可能造成计算机系统泄露

    youdao

  • You configure Websphere Portal to avoid unauthorized access by using an LDAP directory for authentication.

    可以配置WebspherePortal通过使用LDAP目录进行身份验证从而避免非授权访问

    youdao

  • The authorize methods are designed to protect the methods in a service layer from unauthorized access.

    authorize方法设计用于保护服务中的方法免受未经授权的访问。

    youdao

  • It usually has built-in security features that help protect against unauthorized access to customer data.

    通常具有内嵌安全性特征保护客户数据拒绝未授权访问

    youdao

  • Every database management system must be able to protect data against unauthorized access and modification.

    每个数据库管理系统必须保护数据不会受到未授权访问修改。

    youdao

  • Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.

    大多数时间不会针对基础设施用户非授权访问内容进行保护

    youdao

  • We maintain strict security standards and procedures to prevent unauthorized access to information about you.

    我们设有严格安全标准程序防止未经授权访问信息

    youdao

  • Valuable assets, including intellectual assets and information, are protected from unauthorized access or use.

    有价值资产包括知识产权信息,非经授权不得使用。

    youdao

  • He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.

    指控利用25个身份盗窃非法访问非法损坏一个受保护的计算机。

    youdao

  • We highly recommend explicitly changing the value of these parameters to valid group names in order prevent unauthorized access.

    我们强烈建议明确这些参数改为合法以便防止未授权访问

    youdao

  • Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.

    这些专业人员专门处理安全问题能够提供不同寻常建议保护数据避免未经授权的访问。

    youdao

  • Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.

    特定页面访问使用J2EE声明性程序性安全限制,以禁止对页面的非授权访问。

    youdao

  • In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.

    此外我们雇佣了保安使用了电子安全多项措施防止未经授权下访问用户信息

    youdao

  • It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.

    可以报告服务器未授权访问尝试因此对于审核LotusDomino服务器的安全性一个有用的工具

    youdao

  • In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.

    除了认证问题外,能够数据库服务器安全形成威胁还包括敏感信息未经授权访问

    youdao

  • Seriously, at some point yesterday, customers were reporting unauthorized access to other customers' accounts - but nothing really came of that.

    严肃的吧,昨天某些时候,有些消费者称,预订时,存在帐户非法侵入,但是没有造成其他后果。

    youdao

  • There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.

    关于Dropbox业已到位的安全程序或者他们如何实施加密阻止的文件的未授权访问,根本没有更多细节

    youdao

  • There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.

    关于Dropbox业已到位的安全程序或者他们如何实施加密阻止的文件的未授权访问,根本没有更多细节

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定