潛在犯罪人 的英文怎麼說

中文拼音 [qiánzàifànzuìrén]
潛在犯罪人 英文
potential criminal
  • : Ⅰ動詞1 (隱在水下) go underwater; hide under water; dive 2 (隱藏) hide3 [書面語](涉水) wade ...
  • : Ⅰ動詞1 (抵觸; 違犯) go against; offend; violate 2 (侵犯) attack; violate; work against 3 (發...
  • : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
  • 潛在 : latent; potential; lurking
  • 犯罪人 : offender
  • 犯罪 : commit a crime [an offense]: 犯罪的中止 desistance from offense; 犯罪和青少年犯罪 crime and delin...
  1. Cooperated by the related department, shanghai procuratorial office caught 5 eloping suspected offender, involving 2 aboard eloping suspected offender. they came back from south africa and from u. s. a subsequently, surrendered

    2006年上海檢察機關有關部門配合下,追捕到案5名逃的職務嫌疑,其中逃境外的2,這兩先後從南非和美國回滬投案自首。
  2. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取的計算機線索。
  3. ( 2 ) we should strengthen education and legal system, and should manage enforcing law strictly in order to smashing their idea of trusting to luck as possible as we can, so they can recognize meshes of the law

    ( 2 )要加強教育,健全法制,嚴格管理、執法,最大可能地打破潛在犯罪人的僥幸心理、鋌而走險心理。
  4. According to the research, we suggest that : ( 1 ) we should discover and transform harmful psychological factors in time, which is belong to latest criminals, and release it effectively in order to avoiding occurrence of criminal behavior

    依據本研究結果,我們建議: ( 1 )要及時發現、轉變潛在犯罪人已經形成的不良心理因素使其得以有效的釋放而不致於外化為行為。
  5. This thinking model has long determined the research interest of criminology and the investing ratio on the crime prevention system. however, the crime prevention strategy singly aimed at criminal and potential criminal was being increasingly negated by crime realities. the fruitlessness of this prevention strategy has already proved its limitation and unilateralism

    然而,曾一度以單一針對潛在犯罪人一方的防治策略越來越被現實的境況加以否定,正是這種效果甚微的預防現狀印證了傳統單方防治策略的局限性和片面性。
  6. If i am right in thinking that the case for punishing the guilty must be made utimately on the claim that such is justifiable as the only realistic means by which to deter potential offenders, then those who are so horrified by the presence of the bare possibility of the punishment of the innocent ought to be far more concerned than they are over the punishment of the guilty

    作為唯一一種威懾潛在犯罪人的現實手段,如果認為懲罰應該建立這樣做是正當的主張上的想法是正確的,那麼那些被呈現出來的懲罰無辜者的可能性威嚇的們應該遠遠沒有懲罰本身受到關注。
  7. In the realm of criminals, the crook with the gold - plated pen or the knowledge how to get inside a computer system outranks by far bank robbers and holdup men for money stolen

    世界里,靠一支鍍金鋼筆走天涯或懂得如何進別電腦系統里去的騙子,以攫取到的金額而言,絕對遠勝打劫銀行或攔途截劫的匪徒。
  8. That means not repeating the mistake just made by italian politicians, who have demonised romanian immigrants as potential and actual criminals and passed a decree making it easier to deport them

    這就意味著不能再重義大利政治家們已經下的錯誤,他們把羅馬尼亞妖魔化為的或者現實的,並通過了一項可以更輕易地將他們驅逐出境的法令。
  9. Fifth, of particular importance in digital forensics is the requirement to successfully narrow the potentially large search space often presented to investigators of such crimes and to effectively find out the potential evidence scattered in data entries

    第五、計算機取證調查中不但由於大量計算機取證數據的存,而且由於異常行為往往隱藏分散的數據之中,使得調查員很難獲得的數字證據。
分享友人