| 1. | In computer security , a successful unauthorized access to an adp system 在计算机安全学中,成功地非法进入自动数据处理系统。 |
| 2. | In computer security a manually operated switch or device that activates an alarm 计算机安全学中,指手工操纵的能发生警报的开关或设备。 |
| 3. | In computer security , an attempt to gain access to a system by posing as an authorized user 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。 |
| 4. | In computer security , a description of the characteristics of an entity to which access is controlled 在计算机安全学中,一种对存取受到控制的实体的特徵的描述。 |
| 5. | In computer security , a description of the characteristics of an entity to which access is controlled 在计算机安全学中,一种对存取受到控制的实体的特征的描述。 |
| 6. | In computer security , the overwriting of classified information on magnetic media such that the media may be reused 在计算机安全学中,覆盖磁介质上的保密信息,使介质得以重新使用。 |
| 7. | In computer security , data left in storage after processing operations and before degaussing or rewriting has taken place 在计算机安全学中,经处理操作后,消磁或重写数据前剩留在存储器中的数据。 |
| 8. | In computer security , the performance of tests and evaluations in order to determine compliance with security specifications and requirements 在计算机安全学中,确定与安全性说明书及要求是否一致的测试及评估。 |
| 9. | In computer security , aspecific type of interaction between a subject and an object that results in the flow of informationfrom one to the other 计算机安全学中,在主体和客体之间导致信息相互流动的一种相互作用。 |
| 10. | In computer security , searching for telephone numbers and passwords by successively trying various combinations of numbers and letters 在计算机安全学中,以连续地试验数字和字母的各种组合来搜索电话号码或口令的方法。 |