exploiting
- exploiting的基本解释
-
-
[变形] exploit的现在分词
-
-
开拓
- 相似词
- 更多 网络例句 与exploiting相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilter's frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the user's interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了7个部分:第1部分对防火墙的概述;第2部分则介绍此次开发的平台LINUX和软调环境;第3部分对几种网络协议做了简单的分析;第4部分分析了网络攻击及其防御措施;第5部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第6部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
- 更多网络解释 与exploiting相关的网络解释 [注:此内容来源于网络,仅供参考]
-
exploiting:开拓
这个矩阵被划分成三个阶段:探索(EXPloring)、扩展(Expanding)和开拓(Exploiting). 可以使用像BEA Online Self-Assessment Tool这样的工具来评估架构的成熟度. 在开发IT架构时显而易见的是,要真正实现商业利益就要从根本上改变关于系统设计的思维方法.
-
exploiting:剝削
nonmetallic 非金屬的 | exploiting 剝削 | virgin 處女
-
exploiting:利用
pollution 汙染 | exploiting 利用 | virgin 未開發的
-
exploiting:開發
depleted 用盡 | exploiting 開發 | virgin 原始
-
exploiting loopholes:钻空子
on one's own account:独自,责任自负. 等等. | .exploiting loopholes,钻空子. | loophole:堡垒的枪眼,窥探孔;契约中的漏洞.
- 加载更多网络解释 (4)