computer security technology造句
例句與造句
- Schneier said, referring to some of the more popular computer security technologies.
- But people familiar with the situation and sympathetic to Weiss said the dispute involves seven to 10 patents covering different types of computer security technology.
- Cylink Corp . shares rose as much as 38 percent after Microsoft Corp . licensed Cylink's computer security technology for its updated Internet browser and Windows NT business software.
- Poindexter, who is 65, was a controversial figure both for his role in the Iran-contra scandals and for his efforts to assert military influence over commercial computer security technologies.
- And a prohibition would remain on the export of computer security technology to nations the Unites States labels as terrorist : Iran, Iraq, Libya, Syria, Sudan, North Korea and Cuba.
- It's difficult to find computer security technology in a sentence. 用computer security technology造句挺難的
- In 1994, Edward Amoroso put forth the concept of a threat tree in his book, Fundamentals of Computer Security Technology . The concept of a threat tree was based on decision tree diagrams.
- They discussed Sheymov's new company; Hanssen, who was about to return to FBI headquarters for a job in information and computer management, said that the bureau might be interested in Invicta's computer security technology.
- It has often focused on the government, earning a pit-bull reputation in fights with the Clinton administration over export controls on computer security technology, or encryption, and the administration's refusal to pass Internet privacy laws.
- So many people tried to download a SATAN protection program dubbed Courtney, created by Computer Security Technology Center, a division of the U . S . Department of Energy stationed at Lawrence Livermore Laboratory, that the system had to shut down Tuesday, said Craig Savoye, a spokesman.
- Buffer overflows were understood and partially publicly documented as early as 1972, when the Computer Security Technology Planning Study laid out the technique : " The code performing this function does not check the source and destination addresses properly, permitting portions of the monitor to be overlaid by the user.
- "If someone were to take advantage of the vulnerability in your system, they could literally shut down your business, either taking information and giving it to a competitor or altering information or just erasing it, " said Harry Bruestle, deputy program manager for Computer Security Technology Center, a division of the U . S . Department of Energy stationed at Lawrence Livermore Laboratory.