|
In computer programming, to copy from locations in main storage into locations in the same main storage.
|
|
|
在计算机程序设计中,将主存某些单元的内容复制到同一主存中的其它单元中去。同transfer。 |
|
In computer programming, to resolve a string of characters, representing for example a program statement, into its elemental parts as defined by(say) the programming language.
|
|
|
在计算机程序设计中,从字符串(例如代表程序的语句)中分辨出程序设计语言中所定义的基本语法成分。参阅compiler。 |
|
In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security.
|
|
|
在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
|
|
|
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。 |
|
In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack.
|
|
|
在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。 |
|
In computer security, especially specifies embezzlement with the aim of or directly using a computer and/or network.
|
|
|
在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。 |
|
In computer security, the granting to a user, a program or a process the right of an access, or the right given to a user to communicate with or make use of a computer system or stored data.
|
|
|
在计算机安全中,授权某用户以特定的方式与某计算机系统通信或使用所存储的数据,或授权某用户、程序或进程以特定的某种方式存取信息。 |
|
In computer security, the independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, and to recommend any indicated changes
|
|
|
在计算机安全中,为测试计算机控制的正确性,为确保按照既定政策和操作步骤执行,为提供在控制政策和步骤中的任何指定的变化而对系统的记录和活动进行的独立的审核和检查。 |
|
In computer security, the means through which the ability orintent of a threat agent to affect adversely an automated system facility or operation can be manifest.
|
|
|
在计算机安全学中,使对一自动系统的操作或功能的恶劣影响能力及意图得以实现的手段。 |