查询词典 counterespionage
- 与 counterespionage 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
But most of all, he possessed a streak of determinations, if not ruthlessness, which made him a superb head of counterespionage
最重要的是,他虽然说不上残酷无情,但却意志坚决,这使他成了极好的反间谍领导人。
-
F. If you think this is all too bourgeois, make John a revolutionary and Mary a counterespionage agent and see how far that gets you.
楼 如果你认为这是太资产阶级,使约翰革命和玛丽一反间谍代理人,并见有多远即让你的。
-
The wilderness of the city; the wilderness of counterespionage; a wilderness of voices.
城市令人困惑不解的地方;反间谍的复杂状况;声音噪乱
-
So police and detective work, espionage and counterespionage, the law, physics or psychology may attract them, and they can become masters of the written and spoken word.
因此, 警察和侦探,间谍和counterespionage ,法律,物理或心理可能吸引他们,他们可以成为大师的书面和口头语言。
-
The analyst points out, although industry is fighting poison and way of efforts of counterespionage software side,be correct, but the assault that still can't stop the baleful executable program that has specific aim.
分析师指出,尽管业界在杀毒和反间谍软件方面所做的努力方向是正确的,但还不足以阻止有针对性的恶意可执行程序的袭击。
-
He began his career handling Soviet counterespionage for the FBI, until Hoover sacked him for drunkenness
他以在联邦调查局处理对苏反谍工作而开始他的职业生涯,直到后来由于酗酒而被胡佛解职。
-
The cold war, just beginning, took form upon a battlefield of deadly concealed knowledge, of espionage and counterespionage, the terrible prize of which was the secret of the power to destroy the world.
刚刚开始的冷战成了争夺极其隐秘的情报的战场,成了进行间谍活动和反间谍活动的战场,其可怕的战利品就是关于毁灭世界的力量的秘密。
-
The letters "provide tremendous leads to follow and often with which to corroborate other evidence in the context of counterespionage and counterterrorism," said Maj.
国家安全信"提供了惊人的领导权力,并且通常插手了超越反恐怖主义和反间谍活动之外的其他事件",五角大楼发言人Maj。
-
Come so, active advantageous position returned Microsoft hand again in, baoermo's choice has a lot of, can adopt 2 form open market is bought, same OK also the partner with counterespionage existing Yahoo.
这样一来,主动权再一次回到了微软手里,鲍尔默的选择有很多,可以通过二级公开市场收购,同样也可以策反雅虎现有的股东。
-
If use counterespionage to concealment,software scans, meeting discovery is in system dish below a lot of important folder, already had the virus amid breed that gives priority to with pilfer date trojan, the network belongings security that gives an user brings serious menace.
若使用反间谍隐蔽软件扫描,会发现在系统盘的许多重要文件夹下,都已有以盗号木马为主的病毒在其中孳生,给用户的网络财产安全带来严重的威胁。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。