英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

As I understand it,"hacker" should generally be classified as "positive","evil" categories, hackers upright on their own knowledge to help system administrators to identify the loopholes in the system and improve, and hackers are邪派skills through a variety of hacker attacks on the system, intrusion, or do some other things harmful to the network, because hackers are engaged邪派things contrary to the "hacker code of practice", real name so they called the "hacker" and non-a "hacker", that we normally hear the "hacker" and "Honker".

以我的理解,"黑客"大体上应该分为"正"、"邪"两类,正派黑客依靠自己掌握的知识帮助系统管理员找出系统中的漏洞并加以完善,而邪派黑客则是通过各种黑客技能对系统进行攻击、入侵或者做其他一些有害于网络的事情,因为邪派黑客所从事的事情违背了《黑客守则》,所以他们真正的名字叫"骇客"而非"黑客",也就是我们平时经常听说的"黑客"和"红客"。

The book, which comprises twenty-four chapters, readily falls into two main parts and an appendix, which may be summarized thus:(1) the events following Moses' death; the invasion and capture of the land;(2) the division of the country;(3) the conduct of the Reubenites, etc.; two hortatory addresses by Joshua shortly before his death, followed by a brief gloss on his burial-place and the disposition made of the bones of Joseph.

这本书,其中包括24章,很容易陷入两个主要部分和一个附录,可归纳如下:( 1 )之后的事件摩西死亡;入侵和捕获的土地;( 2 )分工该国;( 3 )进行有关reubenites等;两个劝告地址,约书亚不久,在他死之前,随后简要介绍掩饰对他的埋葬地点和处置作出的骨头约瑟夫。

This research using the experiment of seed germination preliminarily proved the chemical mechanism of the host plant.

通过加拿大一枝黄花地上部分水浸提液处理3种植物种子的实验,初步揭示了该植物的化学入侵机制。

They say all those invasions by the Normans and Romans simply left it with a "hotchpotch" of other people's culture.

他们认为,历史上诺曼人和罗马人的入侵给英格兰遗留下的只是别国民族文化的"大杂烩"。

Wars diminish in number and are waged with humanity; atrocities like those of the Thirty Years War in Germany, the Huguenot wars in France, the Spanish wars in the Netherlands, and Cromwell's invasion of Ireland are gone beyond the possibility of return.

星球大战的数量减少,并发动与人类类似的暴行的三十年战争在德国,胡格诺派在法国的战争,西班牙战争中,荷兰和克伦威尔入侵爱尔兰超出了返回的可能性。

There are 34 species of exotic invasive plants, 17 families and 29 genera are identified in Henan province. There are one species of hydrophyte and 33 species of terricolous among them.

河南的外来入侵植物有34种,隶属17科29属,其中水生植物1种,陆生植物33种。

Our own immune cells produce significant amounts of hypochlorite as a first line of defense to kill invading microorganisms.

我们自身的免疫细胞产生大量的次氯酸钠作为杀死入侵微生物第一道防线。

As wave after wave of hackers invades yoursystem, racing down through paths in the grid you must stop them by dropping Black Ice bombs on thepath in front of them.

当一拨又一波的黑客入侵你的系统的时候,在表格的路径上你必须通过在黑客前面的路径上安置 Black Ice 炸弹的方式与之展开竞赛。

The managing subsystem realize the quintuplicate system of bank, obligation center,product, subject and client. The subsystem also can manage the identity and purview of operator, prevent the illegal users from invading the system , and the legal user from exceeding their authority;The apportioning subsystem read the data stored in computer firstly. In the second it proportion the cost of the bank to the obligationg centers . The apportioning subsystem continue apportioning until the cost is proportioned to the group of clients; The evaluating of achievement subsystem evaluate the achievement of bank, and grade the bank according to the evaluating result.

管理子系统对网点、责任中心、产品、科目、客户等基本信息进行了管理,对操作人员的的身份、权限进行管理,防止非法用户的入侵,避免操作人员越权操作;成本自动分摊子系统首先对各网点的大机数据的导入,然后将网点的成本向下分摊到各责任中心,再由各责任中心继续向下分摊,直到最后将成本分摊到了各个客户群;业绩价值评价子系统对各网点的业绩价值进行了确定,并进一步根据网点的业绩价值进行业绩价值评分。

The research and development of IDS has become the important subject about network security.

入侵检测系统的研究和实现已经成为现在网络安全的重要课题。

第53/100页 首页 < ... 49 50 51 52 53 54 55 56 57 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。