1.
Thoughts on Perfecting the Legislation for Illegal Invasion of Computer Information System;
完善非法侵入计算机信息系统罪的几点思考
2.
Research of the Problems of the Judicial Determination and Legislative Perfection of Crime of Illegally Breaking into Computer Information System;
非法侵入计算机信息系统罪的司法认定与立法完善问题研究
3.
To scramble access codes to(computerized information)so as to prevent unauthorized access.
加密,译成密码扰乱(计算机存储信息)存取密码以防止非法侵入
4.
In computer security, the unauthorized interception of information-bearing emanations through the use of methods other than wiretapping.
在计算机安全学中,指从计算机系统非法窃取信息。
5.
Information put into a communications system for transmission or into a computer system for processing.
输入资料存入通讯信息系统以传送或进入计算机系统运行的信息
6.
Whoever violates state regulations and intrudes into computer systems with information concerning state affairs, construction of defense facilities, and sophisticated science and technology
违反国家规定,侵入国家事务、国防建设、尖端科学技术领域的计算机信息系统的,
7.
The Regulation on Railway Information System Security Guarantee
铁路计算机信息系统安全保护办法
8.
computer-based management information system
管理信息计算机系统
9.
ICS (Information Computer System Ltd)
信息计算机系统公司
10.
computerized message switching system
计算机化信息转接系统
11.
Computerized Management Information System
计算机化管理信息系统
12.
computerized registry information systems
计算机化登记信息系统
13.
Probing into Internal Control System of Computerized Accounting;
计算机引入后会计信息系统的内部控制
14.
In computer security, the accidental flow, to unauthorized in dividuals, of data or information access which is presumed to is controlled by computer ?security?safeguards.
在计算机安全学中,认为由计算机安全保障系统控制的数据或信息意外地流向非法的个人。
15.
To enter, process, or store(information) in a computer or system of computers.
用电脑处理在计算机或计算机系统中输入、处理或存储(信息)
16.
Computerized System of Fish Marketing Informatio
计算机化鱼产销售信息系统(鱼销信息)
17.
Designing the Man-Computer Interface of Computer Aided Accounting Information System
计算机会计信息系统的人-机接口设计
18.
Design and Implementation of IDS Supporting Computer Forensics
支持计算机取证的入侵检测系统的设计与实现