英语人>网络例句>UNIX 相关的网络例句
UNIX相关的网络例句
与 UNIX 相关的网络例句 [注:此内容来源于网络,仅供参考]

Unix is like a wigwam -- no Gates, no Windows, and an Apache inside.

如果我是斑竹,我会给楼上个大苹果啃一啃

Some parts are aphoristic and general, others will

部分高屋建瓴,部分又会结合Unix开发的实际例子。

Some parts are aphoristic and general, others will examine specific case studies in Unix development.

我们将在原则和格言之前或之后提供一些实例以说明它们,这些实例并非是从玩具性质的演示程序中抽出的,而是来自每天都在运行的工作代码。

Some parts are aphoristic and general, others will examine specific case studies in Unix development.

在普遍规律、箴言的之前或之后,我们将给出解释性的例子:例子不是来自玩具般的演示程序,而是来自每天都在使用的、真实的运行代码。

Programs (nethack, Emacs's VC and GUD modes, xlife, andothers) that are still in wide use today.

候,我已经在Unix和开放源代码开发领域做了十年了。

Old-school refers to the pre-1990(and especially pre-1985) world of expensive computers, proprietary Unixes, scripting inshell, and C everywhere.

老学校指代的是90年代之前的(特别是1985年之前的)世界,那个时代充斥着昂贵的计算机,私有的Unix,shell下的脚本,以及遍地都是的C。

Old-school refers to the pre-1990(and especially pre-1985) world of expensive computers, proprietary Unixes, scripting inshell, and C everywhere.

而就学派是指90年代之前(尤指1985年之前),那是昂贵的计算机的世界,是它们拥有着Unix,Shell脚本和C。

Ve developed a number of key skills,including business modeling,process reen

过程重建、软件包评价和在UNIX和C语言环境下的优秀编程技能。

Steg B(superscript +)-Tree, which uses steganographic technologies to overcome above mentioned weakness is presented by hiding the existence of data so that an adversary could get no information about whether the protected data ever exists without correct object name and access key.

介绍一种新的着重于隐藏数据的存在性的加密手段-隐文加密(Steganography,隐写术)来对重要文件的存储进行加密,该方法采用隐文B树Steg B(上标+ Tree建立UNIX系统的文件索引,并通过隐藏表将隐文B树索引隐蔽起来,使攻击者无法知道重要信息的存在,从而使要保护的信息更安全。

It makes its capabilities unforgeable by storing them in internal kernel memory space. POSIX capabilities used in Linux , which are quite different, divide all traditional powerful root privilege into a set of distinct privileges, therefore harden Linux in face of some defective programs.

它采用保护地址空间的方法使得其能力不可伪造,但它跟经典的能力系统实现存在较大的差异,Linux中使用的POSIX Capabilities则完全不同,它只是将传统Unix系统中的强大的root权限作一有限子集划分,从而使得Linux在面临运行存有安全漏洞的程序时不至于全线崩溃。

第27/29页 首页 < ... 21 22 23 24 25 26 27 28 29 > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。