英语人>网络例句>in defence of 相关的网络例句
in defence of相关的网络例句

查询词典 in defence of

与 in defence of 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this study, the Howard government's interest in increasing the intimacy of its defence connections with the US over the past ten years now abrade against its new found interest in commercial relations with China.

本文发现霍华德政府在过去十年力图增加与美国的防卫关系,然而此一作法现在已与其新欢中国强化商业关系有所擦撞。

Defence is a good sector in which to start your career, Ball says. It's is a very tight-knit industry, so if you make a name for yourself in one organisation it will come to the attention of others in the sector.

巴尔说,防务部门是你开始职业生涯的一个不错的领域,这是一个高度组织严密的产业,所以如果你在一个机构出了名,也会引起这个领域其他人的注意。

In that situation, as we strive with all thought, care, effort and zeal for everything to be brought to the desired end, and with confidence in the gift of God, we have decreed that legates with a special mission from us -- who will be cardinals of the holy Roman church and who are soon to be named by us, on the advice of our brothers, in our secret consistory -- shall be appointed and sent with authority and with the necessary and appropriate faculties, as messengers of peace, for the arranging, negotiating and settling of this universal peace among Christians, for the embarking upon an expedition against the infidels, with the approval of this sacred council, and for inducing the said kings, out of generosity of soul befitting their rank and out of devotion towards the catholic faith, to move with ready and eager minds towards the holy tasks of both peace and the expedition, for the total and perfect protection, defence and safety of the entire christian state.

在这种情况下,我们在努力与所有思想,护理,精力和热情都被带到理想的目的,并有信心在上帝的礼物,我们已颁布法令, legates了特殊的使命我们-谁在枢机主教的神圣罗马教会,谁是不久将任命由我们的意见,我们的兄弟,在我们的秘密一致性-应任命和派出的权威和必要的和适当的院系,作为和平使者,的安排,谈判和解决这一普遍和平的基督徒,为著手远征打击异教徒批准,这个神圣的议会,并诱导说君王,出於慷慨的灵魂符合其级别和出奉献对天主教的信仰,将与作好准备,实现心中的神圣任务,和平与考察,为彻底和完善的保护,防务和安全的整个基督教国家。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The region between the circular brown band generated by cell lipid exosmosis and the band of the wound in the non-transgenic cotton Z35's leaves, is wider than that of the transgenic cotton T-34's leaves, and no micro-HR was found in Z35, the intensity of leaves wilting is much serious, by contrast, micro BR was found around the wound region within the transgenic cotton leaves inoculated with the pathogen, but the micro-HR was not found in the transgenic cotton treated with water and around wound region of non-transgenic cotton Z35 leaves which showed that there was micro-HR defence in transgenic hpa1xoo cotton.

棉花黄萎病菌侵染叶片后,非转基因棉花叶部伤口周围细胞无微过敏性反应,受病原菌侵染的叶片萎蔫程度较重;转hpa1xoo基因棉花叶部伤口周围细胞有微过敏反应,叶部刺伤处仅有较小的坏死斑,且不相连,发病较轻,而清水处理的转基因棉花与非转基因棉花叶片中伤口周围均无微过敏反应,说明病原菌侵染诱导转hpa1xoo基因棉花产生微过敏防御反应,转hpa1xoo基因棉花较非转基因棉花有较强的抗病性。

In order to refine a method for defence against at least one attack made by means of differential power analysis on at least one hyperelliptic cryptosystem, in particular at least one hyperelliptic public key cryptosystem, which is given by at least one hyperelliptic curve of any genus over a finite field in a first group, where the hyperelliptic curve is given by at least one co-efficient, so that an essential contribution can be made towards an efficient and secure implementation of the hyperelliptic cryptosystem, it is proposed that the hyperelliptic curve and/or at least one element of the first group, in particular at least one in particular reduced divisor and/or at least one intermediate result of a scalar multiplication, is randomised.

为了改进用于防御在至少一个超椭圆密码系统中、特别是在至少一个超椭圆公共密钥密码系统中通过微分功率分析作出的至少一个攻击的方法,该超椭圆公共密钥密码系统是通过在第一组中有限域中任何种类的至少一个超椭圆曲线给出的,其中超椭圆曲线由至少一个系数给出,以使得可以对于超椭圆密码系统的有效而安全的实施方案作出重要的贡献,提出将超椭圆曲线和/或第一组的至少一个元素、特别是至少一个特定的减小的除数和/或标量乘法的至少一个中间结果进行随机化。

In the first part, the opinions and ideas from some main figures concerning the North-western regions in modern history; In the second part, the process of three vital stages(Yang-Wu Movement, the "New Deal" in the last period of Qing Dynasty, Anti-Japanese War) are studied, and the characteristics of each stage are generalized falling into four categories, such as: military、feudal、comprador and nation-monopoly etc; In the third part, four reasons of the low efficiency of the industrial and mineral exploration are explored, they are the dominant role natural economy, the low level of productive forces, the science and technology, lack of capital accumulation and investment, lack of systematic policies and support from the government, In a word, as Mao Tsetung said:"It"s impossible to get rich, develop industry, strengthen national defence in semi-colonel and semi-feudal China.

全文共分四部分,第一部分论述了近代一些主要的阶级关注西北的言论和思想;第二部分对西北近代工矿业开发的三个最重要的阶段,即洋务运动时期、清末"新政"时期、抗日战争时期的开发过程做了梳理,并对每一个阶段的特点做了初步地概括,大致可以归纳为军事性、封建性、买办性以及国家垄断性等;第三部分对西北近代工矿业开发成效不高的原因做了论述,主要有四点:第一,小农业与家庭手工业紧密结合的自然经济占统治地位;第二,生产力水平低下,科学技术落后;第三,缺乏资金的积累和投入;第四,缺乏政府系统的政策支持和保障。

However,such method,in fact,not only destroys the integrity of legitimate defence,but also intrudes the space of self-defence theory.

这不仅破坏了正当防卫理论的完整性,而且也挤占了自救行为理论应有的地位。

Other programmes such as MEADS further serve to position MBDA at the heart of the European defence sector as well as establishing cooperative transatlantic links with the principal groups in the US defence industry.

其他项目,诸如MEADS,进一步加强了MBDA在欧洲防务中的核心作用,并且与美国主要的防务公司建立了横跨大西洋的合作关系。

The battles of self-defence fought by the Fourth and the Fifth Detachments against the attacks of Han Teh-chin and Li Tsung-jen in eastern Anhwei and those fought by Li Hsien-nien's column against the die-hards' attacks in central and eastern Hupeh, the determined struggle carried on by Peng Hsueh-feng's detachment north of the Huai River, the expansion of Yeh Fei's forces north of the Yangtse River, and the southward movement of over 20,000 men of the Eighth Route Army to areas north of the Huai River and to eastern Anhwei and northern Kiangsu--all these were not only absolutely necessary and correct in themselves, but were indispensable for making Ku Chu-tung think twice before attacking you in southern Anhwei and southern Kiangsu.

四、五支队反对韩德勤、李宗仁向皖东进攻的自卫战争,李先念纵队反对顽固派向鄂中和鄂东进攻的自卫战争,彭雪枫支队在淮北的坚决斗争,叶飞在江北的发展,以及八路军二万余人南下淮北、皖东和苏北,均不但是绝对必要和绝对正确的,而且是使顾祝同不敢轻易地在皖南、苏南向你们进攻的必要步骤。

第16/41页 首页 < ... 12 13 14 15 16 17 18 19 20 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。