|
In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. |
中文意思: 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。 |
以下为相关句子列表(点击查看,可以看对应的解释):
|
|
In computer programming, a process which repeats the same series of processing steps until a predetermined state or branch condition is reached.
|
|
|
计算机程序设计中的一种处理方法,即重复进行相同的一系列处理步骤,直到一个预定的状态或转移条件实现时为止。 |
|
In computer programming, section of a COBOL program that represents a logical processing entity.
|
|
|
在计算机程序设计中,COBOL程序中代表一个逻辑处理实体的一部分。 |
|
In computer programming, section of a COBOL program that represents a logical processing entity.
|
|
|
在计算机程序设计中,COBOL程序中代表一个逻辑处理实体的一部分。 |
|
In computer programming, to copy from locations in main storage into locations in the same main storage.
|
|
|
在计算机程序设计中,将主存某些单元的内容复制到同一主存中的其它单元中去。同transfer。 |
|
In computer programming, to resolve a string of characters, representing for example a program statement, into its elemental parts as defined by(say) the programming language.
|
|
|
在计算机程序设计中,从字符串(例如代表程序的语句)中分辨出程序设计语言中所定义的基本语法成分。参阅compiler。 |
|
In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security.
|
|
|
在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
|
|
|
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。 |
|
In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack.
|
|
|
在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。 |
|
In computer security, especially specifies embezzlement with the aim of or directly using a computer and/or network.
|
|
|
在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。 |
|
|
|