Примеры использования To computer systems на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Illicit entry to computer systems;
There is also a misconception that the problem is limited to computer systems.
Illicit access to computer systems and equipment.
He also considers these notions in relation to computer systems.
The requirements to computer systems of personal-computer class have been growing year by year for 20 years already.
They do not cause any damage to computer systems and files.
That type of device was commonly used in authenticating individuals that sought remote access to computer systems.
Offences involving illegal access to computer systems and data differ with respect to the object of the offence(data,system or information), and regarding the criminalization of“mere” access or the requirement for further intent, such as to cause loss or damage.
OIOS received reports of unauthorized access to computer systems in several missions.
Search and seizure procedures for computer data(i.e., electronic evidence) are, in essence, assimilative provisions that aim to harmonize already existing criminal procedural law powers for search andseizure of tangible objects, in terms of their application to computer systems and data.
A variety of federal laws may also apply broadly to unauthorized access to computer systems or access that exceeds authorization.
Individual delegations also proposed the inclusion of illicit traffic in women and children under subparagraph(b), as well as the inclusion of the following as additional subparagraphs: illicit traffic in migrants; illicit traffic in endangered animals; illicit traffic in human body parts; andillicit access to computer systems and equipment.
The expected results: Knowledge of the basic concepts and directions in the protection of computer information, principles of information protection, classification andexamples of security threats to computer systems, modern approaches to protection of products and information technology systems, the ability to configure built-in security in the operating system, knowledge of the security audit skills of information systems. .
It offers everything you can find in modern office,from staple to computer systems.
Such techniques may include monitoring orders, observation, interception of telecommunications,access to computer systems and orders to produce specific documents.
In the 1960s, when transistor-based computer systems were introduced and computers became more popular,criminalization of offences focused on physical damage to computer systems and stored data.
Such techniques may include monitoring orders, observation, interception of telecommunications,access to computer systems and orders to produce specific documents.
With regard to addressing future requirements of the Fund, paragraphs 122 to 146 of the Board's report discuss the essential long-term technological needs of the Fund andthe modalities for meeting them with regard to computer systems, process re-engineering and technological improvements.
Corruption of public officials and officials of private institutions. Individual delegations proposed the inclusion of illicit traffic in women and children under subparagraph 3(b), as well as the inclusion of the following as additional subparagraphs: illicit traffic in migrants; illicit traffic in endangered animals; illicit traffic in human body parts;illicit access to computer systems and equipment; piracy; kidnapping for ransom; and murder and other grave offences against persons.
Besides criminalizing fraud, the Criminal Code would also criminalize: the commission of theft using computer technology; the unauthorized access to computerized information; the modification of computerized information; computer sabotage; the wrongful appropriation of computerized information; the manufacture orsale of special tools for illegally obtaining access to computer systems or networks; the development, use or dissemination of harmful programs; and the violation of the rules for operating computer systems or networks.
Charging via USB to computer system or power adapter.
Access to computer system, even for mere browsing purposes, will, in most cases, modify the data(such as“recently accessed” documents list) to an extent that this cannot be used as evidence criminal proceedings.
Illegal(Unauthorized) Access to Computer System of the Uzbek Criminal Code.
Charging via USB to computer system or power adapter.
Charging via power adapter or USB to computer system.
The products are supplied to computer system manufacturers and retailers under the brands Western Digital and WD.
Gaining unauthorized access to computers or computer systems.
Always protect access to your computer systems with a safe password.
Attempt to gain unauthorized access to other computer systems through this Site;
Within the optic nerve of the dinosaur is material of use to our computer systems.