Examples of using Secure computer in English and their translations into Hebrew
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Secure Computer Facility offline, ultra-contained.
You have the most secure computers in the world.
Light role-play, um,there's-there's a Web site… I will get a secure computer.
Are you saying that our most secure computer network has been hacked?
It's used with secure computer networks-- the kind that big corporations with lots of sensitive data have, like banks and investment houses.
There is no perfect, fully secure computer program.
In his last interview before retiring, Shaw said the UK had to develop an array of its owncyber-weapons because it was impossible to create entirely secure computer systems.
The only completely secure computer is a computer that no one can use.
Both planes were flown into floors which had secure computer rooms.
He was able to breach the most secure computer system in Britain. So we're on war footing now.
Goff was able to install this software on the most secure computer networks.
These are most often used for logical access- secure computer log-on, data encryption or document signing if PKI is involved.
Either this guy is completely invisible to all surveillance cameras and spy satellites,or he's managed to exploit the most secure computer systems ever designed.
Since 2008, the Moscow- Washington hotline has been a secure computer link over which messages are exchanged by a secure form of email.
Mr. Simmons' money is a bunch of ones and zeros on secure computers around the world.
The program focuses on the study of the design, development and evaluation of secure computer systems, which are also capable of ensuring privacy for future ICT systems.
The only access is from central control in New York orfrom the totally secure computers in the branch offices.
To prevent denial-of-service attacks,this option should be disabled for secure computers connected to the Internet.
Randomness is highly desirablefor constructing the security primitives that encrypt and thereby secure computer hardware and data physically, rather than by programming.
The program prepares students with the necessary foundations for the design anddevelopment of assured, secure computer systems in order to predict, prevent, and respond to cyberattacks.
The program offers students the opportunity to learn the foundations for design anddevelopment of assured, secure computer systems in order to predict, prevent, and respond to cyberattacks.
Personal data is kept in the clinic in a secured cabinet, and on a secured computer.
Securing computers, files, all electronics.