英语人>网络例句>Firewall 相关的网络例句
Firewall相关的网络例句

查询词典 Firewall

与 Firewall 相关的网络例句 [注:此内容来源于网络,仅供参考]

The tool is seen as a good complement to traditional solution for computer security of "Firewall" and "Electronically Encryption", so it is a powerful guarder for computer source.

这是一种通过检测计算机资源使用情况来保护计算机安全的系统,它作为对传统的计算机安全解决方案"防火墙"和"电子加密"的有益补充,为计算机系统的安全保护再添一道有力的屏障。

However, the distributed model of workflow which simply uses component technique can hardly across through the firewall and connects with each other between heteromorphic systems.

然而,单纯使用组件技术的分布式工作流互操作模型很难实现防火墙穿越、异构系统之间的真正互连。

Most of the success of honeypot should be installed behind a firewall, but there are exceptions.

多数成功的蜜罐应当安装在防火墙之后,但也有例外。

In order to solve these problems, in this scheme I take IDS to cooperate with firewall and honeypot for working more efficiently.

为了解决这些问题,提出入侵检测系统与防火墙和蜜罐协作,共同提高工作效率。

AMBASSADOR HUNTSMAN: That's right. And not surprisingly,"in a country with 350 million Internet users and 60 million bloggers, do you know of the firewall?"

可是我想好的远远多于坏的,所以还是保持开放是好的,这是我很高兴互联网也作为这个论坛的一部分。

As is known to all,firewall is a effective way to protect illegal access from the outside.

这样,如何保证系统在运行过程中的安全性就成为必须解决的实际问题。

Since the firewall to prevent illegal network access, then access is not legally prevented even easier?

既然防火墙能阻止非法的网络访问,那么合法的访问不就更容易阻止了?

Access control, firewall, inbreaking detect, to keep the application system safe.

这些办法长短常主要的,但是并不能解决所有的安全题目。

This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.

本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。

From the initial term, IPS is located in your firewall and network devices.

对于初始者来说,IPS位于你的防火墙和网络的设备之间。

第12/28页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
相关中文对照歌词
Firewall
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。