英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

This excuse, as Sweden's foreign minister tartly noted, recalled Hitler's justifications of Nazi invasions.

这个借口被瑞典外交部长尖锐的讽刺为"让人们回忆起希特勒为纳粹入侵所进行的辩护"。

From the beginning of the medieval period in the 3rd century AD until the 7th century,C你好na was not only divided into warring states but suffered invasions by Tatar tribes as well.

从一开始的中世纪时期在公元3世纪至公元7世纪,中国不仅是分为战国,但遭受入侵的鞑靼部落,以及。

Tatar raids depopulated whole areas of Ukraine.

鞑靼入侵使得整个乌克兰地区的人口减少。

Nonspecific cytotoxic cell is the evolutionary precursor of mammalian natural killer cell in teleostean fish, which was mainly separated from blood and lymphoid organ as the first barrier of defense to protect the animal against bacteria, virus and protozoa parasitism, it plays an important role in nonspecific immunity and also has a function of killing tumor cells in vitro.

自然杀伤细胞进化上的前体细胞在鱼类中被称作非特异性细胞毒性细胞,主要来源于血液和淋巴器官,是防御细菌、病毒、寄生性原生动物等入侵的第一道防线,在非特异性免疫中起重要作用,还具有体外杀伤肿瘤细胞的功能。

Among them,73 genera and 36 families,occupies 80.23% of the total number of the genera and 78.26% of that of the families, were tropically and subtropically distributed genera and families, the other 18 genera and 4 families,merely occupied 19.77% of the total number of the genera and 8.70% of that of the families,were temperately distributed genera and families,which suggested that the variation of the altitude might affect the plant composition of communities in some degree.

热带性成分科、属与温带性成分科、属各有36科、73属和4科、18属,分别占样地种子植物科、属总数的78.26%、80.23%和8.70%、19.77%,表明热带性区系成分在群落中的优势地位,同时一定数量的温带成分的入侵,反映出海拔高度变化在一定程度上对植物区系组成的影响,表明鼎湖山山地常绿阔叶林具有向中亚热带常绿阔叶林过渡的特点。

"Teredo/ISATAP is currently and will continue to be a major red flag for networks that have both IP versions enabled, because tunneling confuses the heck out of a lot of firewalls and IDS deployments," he says.

"蛆/ ISATAP目前正在而且将继续是一个重大的红旗的网络,都使知识产权的版本,因为隧道混淆的Heck了大量的防火墙和入侵检测系统的部署,"他说。

Intrusion traceback is an important technology in network security aspect,,which is aiming at tracing the real source of attacking, providing precise information for alarm and supplying reliable proof for post-crime testification and improving network system's security.

入侵跟踪是计算机网络安全领域的一个重要技术,其目的是跟踪攻击的真正来源,为报警提供精确的信息,以及事后的犯罪举证和修补网络系统安全漏洞提供可靠依据。

The youth should enter upon his functions the very next night after, and if the ghost of hapless George Talboys should invade these gloomy apartments, the phantom must make its way across Patrick's body before it could reach the inner chamber in which the proprietor of the premises slept.

这青年明天夜间就该来上班;如果倒霉的乔治·托尔博伊斯的幽灵入侵这些阴沉沉的套间,幽灵必须先越过帕特里克的身体,才能进入事务所主人睡觉的内室。

In 1968, he recorded the invasion of Prague by the Warsaw Pact armies, and his work became internationally known, winning him the prestigious Robert Capa Gold Medal.

1968年,他记录了入侵布拉格的华沙条约组织的军队,他的工作成为国际知名,赢得他的声望罗伯特卡帕金牌。

It may have lost that status about the sixth century A.D., when Slavic invasions began to obliterate Thracian culture.

大约在公元6世纪,斯拉夫人的入侵开始磨灭色雷斯文化,其神圣地位已经丧失。

第93/100页 首页 < ... 89 90 91 92 93 94 95 96 97 ... > 尾页
推荐网络例句

I didn't watch TV last night, because it .

昨晚我没有看电视,因为电视机坏了。

Since this year, in a lot of villages of Beijing, TV of elevator liquid crystal was removed.

今年以来,在北京的很多小区里,电梯液晶电视被撤了下来。

I'm running my simile to an extreme.

我比喻得过头了。