英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

Intrusion detection is an active technology for defense , supplies the complement for shortcoming of traditional security technology like firewall , cryptograph

入侵检测是一种主动防御技术,它弥补了防火墙、信息加密等传统安全技术的不足。

When the Germans invaded Czechoslovakia, he was still influential enough to be one of the first people they arrested.

当德国入侵捷克斯拉夫时,他仍然是有足够的影响力的,所以成为他们第一批逮捕的众人中的一个。

By the time he died, he had stemmed the relentless Ottoman advance through Europe and himself ruled over an empire that stretched from the Black Sea to Dalmatia and from Moravia to Bosnia.

当他逝世时,他已经阻止了无情的奥特曼帝国在欧洲大陆的入侵,并且他自己统治的王国疆域宽广无比——从黑海到达尔马提亚,从摩拉维亚到波斯尼亚。

Venice invaded Dalmatia, Albania, Bosnia, and the Morea.

威尼斯入侵达尔马提亚,阿尔巴尼亚,波斯尼亚和

The country suffered a series of invasions by tribes from present-day Germany and Danmark.

这个国家遭受了今天德国和丹麦一些部落的一系列入侵

It would have been during the Dark Ages, when Vikings frequently invaded the region.

这本来是在黑暗时代,海盗经常在该地区的入侵

Firstly, a probability computing model is constructed to present system call sequences and the SCSFA algorithm is designed to predict the attempt of intrusion and to determine what need to protect, which is based on the analysis of system call sequence in virtual computing systems; Secondly, the sensitive data protected are divided into a number of film data, and for the goals of random errors tolerance, each tablet data are redundant backup based on Byzantine fault tolerance; Then, the redundant data are distributed to different virtual machines.

设计SCSFA算法分析虚拟计算环境的系统调用行为序列,以识别虚拟计算环境下的入侵企图,预测敏感数据的高危区域;其次,将要保护的数据划分成若干片数据,并以容忍虚拟计算环境随机错误为目标对每个片数据冗余备份;然后将冗余片数据分散到不同虚拟机上。

Both firewall technology(Cheswick and Bellovin, 1994;Zwicky et al.,2000)and intrusion detection systems(Axelsson,2000;Debar et al.,1999; Mukherjee et al.,1994)have been developed to detect and to respond against various kinds of Internet-based attacks.

防火墙技术与入侵检测系统都开发来检测与响应不同种类的基于Internet的攻击。

It keeps the fisherman and the deckhand at sea through the winter; it holds the miner in his darkness, and nails the countryman to his log-cabin and his lonely farm through all the months of snow; it protects us from invasion by the natives of the desert and the frozen zone.

它把渔民和渔工在海上度过冬季;它所拥有的矿工在他的黑暗,和指甲,他的同胞日志舱和他的孤独的农场内的所有的雪,它保护我们免受入侵土生土长的沙漠和冻土带。

A configuration file can contain database passwords and other information that could be used by malicious users to penetrate or deface your site; never allow these files to be accessed by remote users.

一个配置文件可以保存数据库密码或者其他可以让恶意用户入侵或修改网站的重要信息;绝对不要让这些文件可以被远程用户访问到。

第36/100页 首页 < ... 32 33 34 35 36 37 38 39 40 ... > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?