| 1. | How is data protected from unauthorized access 如何保护数据不受未授权的访问? |
| 2. | Identity permissions help protect code from unauthorized access 从同一基类派生。 |
| 3. | Protect confidential information from unauthorized access 保护机密资料; |
| 4. | Guard your own resources against unauthorized access 保护自己的资源不受到未经授权的访问。 |
| 5. | That the information had been obtained by unauthorized access , or 有关资料是以未经授权的途径取得的;或 |
| 6. | No unauthorized access prohibited 未经许可,禁止入内。 |
| 7. | Computer systems controls are in place to prevent unauthorized access 是否建立电脑系统的管制以防止未经授权的进入? |
| 8. | Using this mechanism , we can protect web resources from unauthorized access 使用该机制,可以防止未授权用户访问web资源。 |
| 9. | In computer security , a successful unauthorized access to an adp system 在计算机安全学中,成功地非法进入自动数据处理系统。 |
| 10. | Consul software tracks employee behavior and unauthorized access of company records 领事软件铁轨雇员的行为和擅自获取的公司记录。 |