来自专业的译者、企业、网页和免费的翻译库。
participants shall implement adequate security controls to protect their systems from unauthorised access and use .
participants shall implement adequate security controls to protect their systems from unauthorised access and use .
最后更新: 2011-10-23
使用频率: 1
质量:
helaas hebben we daardoor ook te maken met nieuwe uitdagingen, bijvoorbeeld e-criminaliteit, zoals 'unauthorised monitoring' (onbevoegde inzage en bewerking van communicatiemiddelen), fraude, cyberoorlogsvoering en nog vele andere misdrijven.
alas, it has also presented us with new challenges, including e-crimes such as unauthorised monitoring, fraud, cyber warfare and many more.
最后更新: 2012-02-29
使用频率: 2
质量: