1·Changing a single parameter may give the user unauthorized access.
—改变一个单一的参数可能给用户未授权的访问。
2·Locked flash drive will protect your data from unauthorized access.
挂锁优盘可以防止你的数据被越权存取。
3·Data must be protected from unauthorized access and modification.
防止对数据进行未授权的访问和更改。
4·You should also log any attempted unauthorized access to the system.
您应该记录任何不成功的系统登录。
5·Acting as a Policy Enforcement Point, to protect against unauthorized access.
充当策略强制点,以抵御未经授权的访问。
6·Unauthorized access — Gaining unauthorized access to a Web service or its data.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
7·Unauthorized access using techniques such as dictionary attack and falsified message.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
8·Sites should take reasonable steps to protect personal data from unauthorized access.
网站应采取合理的步骤保护个人资料,使其免受未经授权的取得和使用。
9·Protecting information on a system is always a critical task from unauthorized access.
保护系统上的信息不受未经授权的访问一直都是一个关键任务。
10·It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。