Translation glossary: Computer Secutiry relate

Creator:
Filter
Reset
Showing entries 1-50 of 265
Next »
 
Access¡ÒÃà¢éÒ¶Ö§:¡ÒèѴµÑ駡ÒÃÊ×èÍÊÒÃËÃ×Í¡ÒõԴµèÍ«Öè§ÍÒ¨à»ç¹ä´é·Ñ駷ҧµÃá (logical)ËÃ×Í·Ò§¡ÒÂÀÒ¾ (physical) 
English to Thai
AccountÊèǹ˹Öè§ (domain)¢Í§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒ·ÕèãËé¼Ùéãªéà¢éÒ¶Ö§ä´é«Ö觡ÒÃà¢éÒ¶Ö§¹Õé¶Ù¡¤Çº¤ØÁâ´Â¡ÒÃÍéÒ§¨Ò¡¢éÍÁÙŵèÒ§æ·ÕèºÑ¹·Ö¡äÇé àªè¹ ª×èÍacco 
English to Thai
Action¡ÒáÃзÓ:¢Ñ鹵͹·Õè¼ÙéãªéËÃ×Í process ãªé㹡Ò÷Õè¨ÐãËéºÃÃÅؼÅÍÂèÒ§ã´ÍÂèҧ˹Öè§ àªè¹ ¡Òà probe, scan, flood, authenticate, ¢éÒÁ¼èÒ¹ (bypass), spoof, Íè 
English to Thai
Active Attack¡ÒÃâ¨ÁµÕẺ active:¡ÒÃâ¨ÁµÕ·Õè·ÓãËéà¡Ô´¡ÒÃà»ÅÕè¹ʶҹÐâ´ÂäÁèä´éÃѺ͹حҵ àªè¹¡ÒÃà»ÅÕè¹á»Å§ files ËÃ×Í¡ÒÃà¾ÔèÁ files ·ÕèäÁèä´éÃѺ͹حҵà¢éÒä» 
English to Thai
Administrative Security¡ÒúÃÔËÒÃàÃ×èͧ¤ÇÒÁ»ÅÍ´ÀÑÂ:¢éÍ¡Ó˹´·Ò§¡ÒèѴ¡ÒÃáÅÐÊÔ觤Ǻ¤ØÁàÊÃÔÁµèÒ§æ·ÕèµÑ駢Öé¹ÁÒà¾×èÍãËé¡Òûéͧ¡Ñ¹¢éÍÁÙÅÍÂÙèã¹ÃдѺ·ÕèÂÍÁÃѺä´é 
English to Thai
AIS - Automated Information SystemÃкº¢éÍÁÙÅÍѵâ¹ÁѵÔ:ÍØ»¡Ã³ìã´æ·ÕèÍÂÙèÀÒÂãµéÃкº¢Í§à¤Ã×èͧÁ×͵èÒ§æ·Õèàª×èÍÁ⧡ѹ«Ö觷Ó˹éÒ·Õè㹡ÒùÓÁÒ«Öè§, à¡çºÃÑ¡ÉÒ, à»ÅÕè¹á»Å§, ¤Çº¤ØÁ, áÊ´§¼Å, Êè 
English to Thai
Alert¡ÒÃá¨é§àµ×͹:¢éͤÇÒÁ·Õè¶Ù¡à¢Õ¹¢Öé¹ÁÒà¾×èÍãªé͸ԺÒÂʶҹ¡Òóì·Õèà¡ÕèÂÇ¢éͧ¡Ñº¤ÇÒÁ»ÅÍ´ÀÑ¢ͧà¤Ã×Í¢èÒ¡ÒÃá¨é§àµ×͹ÁÑ¡¨Ðà¡Ô´ÁÒ¨Ò¡¡ÒõÃǨÊͺ (audit) ·ÕèÊӤѭ 
English to Thai
Ankle – Biter¾Ç¡§Ñº¢éÍà·éÒ:¼Ùé·Õèµéͧ¡ÒèÐà»ç¹ hacker ËÃ×Í crackeráµèÁÕ¤ÇÒÁÃÙéËÃ×Í·Ñ¡ÉÐà¡ÕèÂǡѺÃкº¢éÍÁÙÅÍѵâ¹ÁѵԷÕè¨Ó¡Ñ´ÁÒ¡â´ÂÁÒ¡¨Ðà»ç¹ÇÑÂÃØè¹·ÕèÊÐÊÁáÅÐãªéâ»Ãá¡ 
English to Thai
Anomaly Detection ModelẺἹ·Õèãªé㹡ÒõÃǨ¨Ñº¡ÒúءÃØ¡â´ÂÁͧËÒ¡Ô¨¡ÃÃÁ¢Í§¼ÙéãªéËÃ×ͧ͢Ãкº·Õè¼Ô´á»Å¡ä»¨Ò¡»¡µÔ 
English to Thai
ASIM - Automated Security Incident Measurement¡ÒÃÇÑ´à˵ءÒóì¤ÇÒÁ»ÅÍ´ÀÑÂẺÍѵâ¹ÁѵÔ:¡ÒÃà½éÒ´Ù trafficã¹à¤Ã×Í¢èÒÂáÅÐà¡çºÊÐÊÁ¢éÍÁÙŨҡà¤Ã×Í¢èÒÂà»éÒËÁÒÂâ´Â¡ÒõÃǨ¨Ñº¡Ô¨¡ÃÃÁ·ÕèäÁèä´éÃѺ͹حҵã¹à¤Ã×Í¢ 
English to Thai
Assessment¡ÒûÃÐàÁÔ¹:¡ÒÃÊÓÃǨáÅеÃǨÊͺ, ¡ÒÃÇÔà¤ÃÒÐËì¶Ö§¤ÇÒÁÅèÍáËÅÁ (vulnerbility)¢Í§Ãкº¢éÍÁÙÅÍѵâ¹ÁÑµÔ ¡Ãкǹ¡ÒùÓÁÒáÅеÃǨ´Ù«Ö觢éÍÁÙÅ«Ö觨ЪèÇÂÅÙ¡¤éÒãËéÊÒÁÒ 
English to Thai
Assurance¡ÒÃÃѺÃͧ:ÊÔ觺觺͡¶Ö§¤ÇÒÁÁÑè¹ã¨ÇèÒÃкº¤ÇÒÁ»ÅÍ´ÀÑÂáÅÐʶһѵ¡ÃÃÁ¢Í§Ãкº¢éÍÁÙÅÍѵâ¹ÁѵԹÑé¹¹ÓÁÒ«Ö觡ÒÃãªéºÑ§¤Ñº¹âºÒÂÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂä´éÍÂèÒ§¶Ù¡µéͧ 
English to Thai
Attack¡ÒÃâ¨ÁµÕ:¤ÇÒÁ¾ÂÒÂÒÁ·Õè¨Ð¢éÒÁ¼èÒ¹ (bypass) ¡ÒäǺ¤ØÁ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧà¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì¡ÒÃâ¨ÁµÕÍÒ¨à»ÅÕè¹á»Å§, »ÅèÍÂÍÍ¡, ËÃ×Í »¯Ôàʸ¢éÍÁÙÅ¡ÒÃâ¨ÁµÕ¨Ð»ÃÐʺ¼ 
English to Thai
Attacker¼Ùéâ¨ÁµÕºØ¤¤Å˹Ö觫Ö觾ÂÒÂÒÁâ¨ÁµÕ, ¤ÃÑé§Ë¹Öè§ËÃ×ÍËÅÒÂæ¤ÃÑé§,à¾×èÍ·Õè¨ÐãËéºÃÃÅبش»ÃÐʧ¤ì 
English to Thai
Audit¡ÒõÃǨÊͺ·Õè¡ÃзÓÍÂèÒ§ÍÔÊÃÐà¾×èÍãËéÁÑè¹ã¨ÇèҺѹ·Ö¡áÅСԨ¡ÃÃÁµèÒ§æà»ç¹ä»µÒÁ¡ÒäǺ¤ØÁ,¹âºÒÂ, áÅÐÃÐàºÕº»¯ÔºÑµÔ·Õèä´é¨Ñ´µÑ駢Öé¹áÅÐà¾×èÍá¹Ð¹Ó¡ÒÃà»ÅÕè¹ 
English to Thai
Audit TrailºÑ¹·Ö¡µÒÁÅӴѺàÇÅҢͧ¡ÒÃãªé·ÃѾÂҡâͧÃкºã¹Ãкº¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì«Öè§ÃÇÁ¶Ö§¡Òà login ¢Í§¼Ùéãªé, ¡ÒÃà¢éÒ¶Ö§ file, ¡Ô¨¡ÃÃÁÍ×è¹æ,áÅСÒõÃǨ´ 
English to Thai
Authenticate¡ÒèѴµÑé§ãËé¼ÙéãªéËÃ×ÍÊÔè§ã´æÁÕ¤ÇÒÁ valid Authentication¡ÒõÃǨÊͺÃÙ»¾ÃóÅѡɳÐ(identity) ¢Í§¼Ùéãªé, ÍØ»¡Ã³ì,ËÃ×ÍÊÔè§Í×è¹æã¹Ãкº¤ÍÁ¾ÔÇàµÍÃìÇèÒà»ç¹µÑÇ 
English to Thai
Authentication Header(AH)Field ·ÕèÍÂÙè¶Ñ´¨Ò¡ IP header ã¹ IP datagram field ¹Õéãªé㹡Òà authentication áÅСÒõÃǨ¤ÇÒÁÊÁºÙóì¢Í§ datagram 
English to Thai
Authorizedä´éÃѺ͹حҵ:ä´éÃѺ¤ÇÒÁàË繪ͺ¨Ò¡à¨éҢͧËÃ×ͼÙé´ÙáÅ (administrator) 
English to Thai
Automated Security MonitoringFeature¤ÇÒÁ»ÅÍ´ÀѵèÒ§æ·Õèµéͧ¹ÓÁÒãªé㹡ÒÃãËé¤ÇÒÁ»éͧ¡Ñ¹á¡è hardware, software,¢éÍÁÙÅ·Ñ駷Õ軡»Ô´áÅÐäÁ軡»Ô´, ¢éÍÁÙÅ·Õè critical, ÇÑÊ´Ø, ËÃ×Í processµèÒ§æ ãË 
English to Thai
Autonomous AgentÇÔ¸Õ˹Ö觷Õè¨Ðãªé©ÇÂâÍ¡ÒÊ㹤ÇÒÁÅèÍáËÅÁâ´Â¡ÒÃãªéâ»Ãá¡ÃÁËÃ×ÍÊèǹ¢Í§â»Ãá¡ÃÁ«Ö觷ӧҹà»ç¹ÍÔÊÃШҡ¼ÙéãªéµÑÇÍÂèÒ§àªè¹ virus ËÃ×Í worm ã¹à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì 
English to Thai
Availability¤ÇÒÁ¾ÃéÍÁãªé¡ÒÃÃѺÃͧÇèÒ¢éÍÁÙÅáÅкÃÔ¡ÒáÒÃÊ×èÍÊÒõèÒ§æ¾ÃéÍÁ·Õè¨Ðãªéä´éã¹àÇÅÒ·Õè¨Ðµéͧãªé 
English to Thai
Backdoor»ÃеÙËÅѧ:ÃÙÃÑèÇ㹡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧÃкº¤ÍÁ¾ÔÇàµÍÃì·Õè¼ÙéÍ͡ẺËÃ×ͼÙé´ÙáŨ§ã¨·Ôé§äÇéÁÕ¤ÇÒÁËÁÒÂà´ÕÂǡѺ»Ãеٴѡ (trap door) «Öè§à»ç¹¡Åä¡ÅѺ·Ò§ sof 
English to Thai
Bell-La Padula Security ModelẺἹ (model)¡ÒÃà»ÅÕè¹á»Å§Ê¶Ò¹ÐÍÂèÒ§à»ç¹·Ò§¡Ò÷ÕèãªÑã¹¹âºÒ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì«Öè§ãªé͸ԺÒ¡ÒäǺ¤ØÁ¡ÒÃà¢éÒ¶Ö§(access) â´Â´Ù¨Ò¡ªÑ鹤ÇÒÁÅ 
English to Thai
Biba Integrity ModelẺἹ (model)¤ÇÒÁ»ÅÍ´ÀÑÂÍÂèÒ§à»ç¹·Ò§¡ÒÃÊÓËÃѺ¤ÇÒÁÊÁºÙóì¢Í§ÊÔ觵èÒ§æ (subjects and objects) ã¹Ãкº 
English to Thai
BombÁÕ¤ÇÒÁËÁÒÂâ´Â·ÑèÇä»àËÁ×͹¡Ñº¤ÓÇèÒ crashâ´Â»¡µÔáÅéÇà¡ÕèÂÇ¢éͧ¡Ñº¡Ò÷Õè software ËÃ×Í Ãкº»¯ÔºÑµÔ¡Òà (operating system) ÅéÁàËÅÇ 
English to Thai
Breach¤ÇÒÁÊÓàÃç¨ã¹¡ÒÃàÍÒª¹Ð¡ÒäǺ¤ØÁ¤ÇÒÁ»ÅÍ´ÀÑ«Öè§ÍÒ¨ÊÒÁÒö·ÓãËéà¡Ô´¡ÒÃà¨ÒÐ(penetration)à¢éÒä»ã¹Ãкºä´é ¡ÒÃÅèǧÅéÓ¡ÒäǺ¤ØÁ¢Í§Ãкº¢éÍÁÙÅ˹Öè§æ«Öè§ÁռŷÓãËé 
English to Thai
Buffer OverflowBufferÅé¹:à¡Ô´¢Öé¹àÁ×èÍÁÕ¡ÒÃãÊè¢éÍÁÙÅà¢éÒä»ã¹ buffer ËÃ×;×é¹·Õèà¡çº·ÕèÁÒ¡à¡Ô¹¡ÇèÒ buffer ¨ÐÃͧÃѺä´é à¡Ô´¨Ò¡¡Ò÷ÕèÍѵÃÒ㹡ÒûÃÐàÁÔ¹¼ÅäÁèà·èҡѹÃÐËÇèÒ 
English to Thai
Bug¤Ø³ÊÁºÑµÔËÃ×ͤÇÒÁÊÒÁÒö㹠software ËÃ×Í hardware·ÕèäÁèà»ç¹·Õèµéͧ¡ÒÃáÅÐäÁèä´éµÑé§ã¨ãËéà¡Ô´¢Öé¹â´Â੾ÒÐÍÂèÒ§ÂÔ觤سÊÁºÑµÔ·Õè·ÓãËé software ËÃ×Í hardwar 
English to Thai
Bypass¡ÒâéÒÁ¼èÒ¹ ¡ÒÃËÅÕ¡àÅÕè§ process ã´ process ˹Öè§â´Â¡ÒÃãªéÇÔ¸ÕÍ×è¹ã¹¡ÒÃà¢éÒ¶Ö§à»éÒËÁÒ 
English to Thai
C2 – Command and Control¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ 
English to Thai
C2-attack¡ÒÃâ¨ÁµÕÃкº¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ: ¡Òûéͧ¡Ñ¹ÁÔãËéÃкº¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ¢Í§¡ÓÅѧ½èÒµç¢éÒÁ·Ó§Ò¹ä´éÍÂèÒ§ÁÕ»ÃÐÊÔ·¸ÔÀÒ¾â´Â¡Òû¯Ôàʸ¢éÍÁÙÅ,Á 
English to Thai
C2-protect¡Òûéͧ¡Ñ¹Ãкº¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ:¡ÒôÓçäÇé«Ö觻ÃÐÊÔ·¸ÔÀÒ¾¢Í§¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ¢Í§¡ÓÅѧ½èÒÂàÃÒâ´Â¡ÒþÖ觾Òã¹¢éÍä´éà»ÃÕº·Õèä´é¨Ò¡¾Ñ¹¸Á 
English to Thai
CGI Scriptsãªé㹡ÒÃÊÃéÒ§ web page ·Õè dynamic áÅÐâµéµÍºä´é (interactive)Êèǹ¹Õéà»ç¹Êèǹ·Õè web server ÁÕ¤ÇÒÁÅèÍáËÅÁÁÒ¡·ÕèÊØ´ (¹Í¡à˹×ͨҡ¤ÇÒÁÅèÍáËÅÁ¢Í§µÑÇ host à 
English to Thai
CGI – Common Gateway InterfaceCGI à»ç¹ÇÔ¸Õ˹Ö觷Õè web serverãªé㹡ÒõԴµèÍáÅÐáÅ¡à»ÅÕè¹¢éÍÁÙÅÃÐËÇèÒ§ server µèÒ§æ¡ÑºµÑÇâ»Ãá¡ÃÁµèÒ§æ 
English to Thai
Check_Passwordâ»Ãá¡ÃÁ¢Í§àËÅèÒ hacker ·Õèãªé㹡ÒÃá¡Ð (crack) passwordã¹Ãкº VMS 
English to Thai
Chernobyl PacketÁÕÍÕ¡ª×èÍ˹Öè§ÇèÒ Kamikaze Packet à»ç¹ packet¢Í§à¤Ã×Í¢èÒ·Õè¡èÍãËéà¡Ô´¾ÒÂØ¡ÒáÃШÒÂàÊÕ§ (broadcast storm)áÅСÒÃËÅÍÁÅÐÅÒ¢ͧà¤Ã×Í¢èÒ (network meltdow 
English to Thai
Clipper ChipChip Ẻ VLSI ·Õè·¹µèÍ¡ÒçѴá§Ð ¶Ù¡Í͡Ẻâ´Â NSAà¾×èÍãªé㹡ÒÃà¢éÒÃËÑÊÅѺ¢Í§àÊÕ§¾Ù´ à»ç¹ä»µÒÁÁҵðҹ¢Í§¡ÒÃà¢éÒÃËÑÊÅѺ¢Í§ Escrow (Escrow Encryption Sta 
English to Thai
COAST - Computer Operations, Audit, and Security Technologyà»ç¹Ëéͧ·´ÅͧÊÓËÃѺ¡ÒÃÇÔ¨ÑÂà¡ÕèÂǡѺ¤ÇÒÁ»ÅÍ´ÀÑÂ㹤ÍÁ¾ÔÇàµÍÃì·ÕèÁÕâ¤Ã§¡ÒÃËÅÒÂâ¤Ã§¡ÒÃáÅмÙéµÃǨÊͺËÅÒ¤¹ µÑé§ÍÂÙè·Õ褳ÐÇÔ·ÂÒ¡ÒäÍÁ¾ÔÇàµÍÃì¢Í§ÁËÒÇÔ·ÂÒÅÑ 
English to Thai
Command and Control Warfare (C2W)¡ÒÃʧ¤ÃÒÁ´éÒ¹¡Òúѧ¤ÑººÑ­ªÒáÅСÒäǺ¤ØÁ:à»ç¹¡ÒÃÃÇÁ¡Òû¯ÔºÑµÔàËÅèÒ¹Õé¤×Í »¯ÔºÑµÔ¡ÒôéÒ¹¤ÇÒÁ»ÅÍ´ÀÑÂ, ¡ÒÃÅǧ·Ò§·ËÒÃ,»¯ÔºÑµÔ¡Ò÷ҧ¨ÔµÇÔ·ÂÒ, ʧ¤ÃÒÁÍÔàÅ硷à
English to Thai
ComponentªÔé¹Êèǹ˹Öè§ã¹à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒ 
English to Thai
Compromise¡ÒúءÃØ¡à¢éÒä»ã¹Ãкº¤ÍÁ¾ÔÇàµÍÃì «Öè§ÍÒ¨·ÓãËéà¡Ô´¡ÒÃà»Ô´à¼Â,¡ÒÃà»ÅÕè¹á»Å§, ËÃ×Í¡Ò÷ÓÅÒ¢éÍÁÙÅÅѺâ´ÂäÁèä´éÃѺ͹حҵ 
English to Thai
Computer Abuse¡ÒÃãªé¤ÍÁ¾ÔÇàµÍÃìâ´ÂÁԪͺ:¡Ô¨¡ÃÃÁµèÒ§æ·ÕèäÁèä´éÃѺ͹حҵ·Ñé§â´ÂµÑé§ã¨áÅÐâ´Â¤ÇÒÁ»ÃÐÁÒ·àÅÔ¹àÅèÍ«Öè§ÁռŵèÍ availability, ¤ÇÒÁÅѺ, ËÃ×ͤÇÒÁÊÁºÙóì¢Í§·ÃѾ 
English to Thai
Computer FraudÍÒª­Ò¡ÃÃÁ·Ò§¤ÍÁ¾ÔÇàµÍÃì·Õèà¡ÕèÂÇ¢éͧ¡Ñº¡Òè§ã¨áÊ´§¢éÍÁÙÅ·Õè¼Ô´¾ÅÒ´ËÃ×Íà»ÅÕè¹¢éÍÁÙÅà¾×èÍ·Õè¨ÐãËéä´éÁÒ«Öè§ÊÔè§ÁÕ¤èÒ 
English to Thai
Computer Network Attack (CNA)¡ÒÃâ¨ÁµÕà¤Ã×Í¢èÒ¤ÍÁ¾ÔÇàµÍÃì:¡Òû¯ÔºÑµÔ·Õè·ÓãËéà¡Ô´¡ÒâҴµÍ¹, ¡Òû¯Ôàʸ, ¡ÒÃÅ´¤Ø³ÀÒ¾, ËÃ×Í¡Ò÷ÓÅÒ¢ͧ¢éÍÁÙÅ·ÕèÍÂÙèã¹à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìáÅÐà¤Ã×Í¢èÒ¢ͧà 
English to Thai
Computer Security¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì:ÃÐàºÕº¡Ò÷ҧ෤¹Ô¤áÅзҧ¡ÒúÃÔËÒ÷Õè¹ÓÁÒãªé¡ÑºÃкº¤ÍÁ¾ÔÇàµÍÃìà¾×èÍãËéÁÑè¹ã¨¶Ö§ availability, ¤ÇÒÁÊÁºÙóì, áÅФÇÒÁÅѺ¢Í§¢éÍÁÙÅ· 
English to Thai
Computer Security Incidentà˵ءÒóìÅÐàÁÔ´¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì:¡ÒúءÃØ¡ËÃ×ͤÇÒÁ¾ÂÒÂÒÁ·Õè¨ÐºØ¡ÃØ¡ã´æà¢éÒä»ÂѧÃкº¢éÍÁÙÅÍѵâ¹ÁÑµÔ (Automatic Information System – AIS) ¡Òà probe 
English to Thai
Computer Security Intrusion¡ÒúءÃØ¡¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì:¡Ô¨¡ÃÃÁã´æ·ÕèÁÕ¡ÒÃà¢éÒ¶Ö§ËÃ×Í¡ÒÃà¨ÒÐ (penetration)à¢éÒä»ã¹Ãкº¢éÍÁÙÅÍѵâ¹ÁѵԠ
English to Thai
Confidentiality¤ÇÒÁÅѺ:¡ÒÃÃѺÃͧÇèÒ¨ÐÁÕ¡ÒÃà¡çº¢éÍÁÙÅäÇéà»ç¹¤ÇÒÁÅѺ áÅмÙé·ÕèÁÕÊÔ·¸Ôà·èÒ¹Ñ鹨֧¨Ðà¢éÒ¶Ö§¢éÍÁÙŹÑé¹ä´é 
English to Thai
Configuration Vulnerability¤ÇÒÁÅèÍáËÅÁ¨Ò¡¡ÒõÑ駤èÒ:¤ÇÒÁÅèÍáËÅÁ·Õèà¡Ô´¨Ò¡¡ÒõÑ駤èÒãËé¡ÑºÃкºÍÂèÒ§¼Ô´¾ÅÒ´ àªè¹¡ÒÃãËéÁÕ account·ÕèÁÕÃËÑʼèÒ¹à»ç¹¤èÒ·ÕèµÑé§ÁÒ¨Ò¡âç§Ò¹ (default),¡Ò 
English to Thai
Next »
All of ProZ.com
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search