英語 での System's security の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Taken to ensure your system's security.
Although each system's security requirements are unique, certain common requirements appear in a number of protocols.
Vulnerability Assessment Analyzing current system's security state.
So how can the system's security be increased?
Vulnerability Assessment Analyzing current system's security state.
Common Issues Although each system's security requirements are unique, certain common requirements appear in a number of protocols.
Therefore, it is very important to take care of the system's security in advance.
The system's security guarantees depend a lot on the effectiveness of these assumptions about how network participants react to certain economic incentives.
This detracts from the system's security and privacy.
Be careful that the contents of these scripts do not compromise your system's security.
These authorizations are granted after officials evaluate a system's security, and are necessary for government operations.
Open attachment'%1'? Note that opening an attachment may compromise your system's security.
Apple says that the root usercan be a significant risk factor to the system's security, especially on systems with a single user account on which that user is also the administrator.
An accreditation is usually based on a technical certification of the system's security mechanisms.
Samsung representatives said the system's security ensured by connecting banks' systems into the data-sharing network, and the certification data within this network can remain valid for up to three years.
It returned the money the next day, having proven that the system's security was flawed.
By doing so, you may better understand what exactly is going on inside suEXEC andwhat precautions are taken to ensure your system's security.
The software records the victim's keystrokes andopens a back door in the system's security to allow the attacker to access the computer.
Information Security Registered Assessors Program of the Australian Government assess the implementation,appropriateness and effectiveness of a system's security controls.
The TCB is a collective acronym for hardware andsoftware that are critical to a system's security, e.g., the kernel and some utilities in an operating system. .
(I) A intra-system channel that permits two cooperating entities, without exceeding their access authorizations,to transfer information in a way that violates the system's security policy.
(I) Information system usage: Technical evaluation(usually made in support of an accreditation action) of an information system's security features and other safeguards to establish the extent to which the system's design and implementation meet specified security requirements.
This security model places the responsibility for the computer system's security on the user.
This security model places the responsibility for the computer system's security squarely on the user's head.
This security model places the responsibility for the computer system's security on the user.
August 2015 Honeywell adds more functionality to your system's security via radio Le Sucre.
A backdoor(or trapdoor) is a technique that's used by hackers andgovernment agencies to bypass the system's security mechanism, undetected.
The expert advice and defense strategies from the world-renowned Hacking Exposed teamshows IT security pros how to bolster their system's security and defeat the tools and tactics of cyber-criminals.
(I) An unintended or unauthorized intra-system channel that enables two cooperatingentities to transfer information in a way that violates the system's security policy but does not exceed the entities' access authorizations.