英语人>网络例句>情报的 相关的搜索结果
网络例句

情报的

与 情报的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Congress rightly felt that it was inappropriate for a military intelligence agency to have control over the dissemination of unclassified information.

国会端正地感觉到了一个军事的情报机构对非机密数据的散播控制是不适当的。

One cannot say that there is no British Intelligence on the matter, as it is quite unfeasible that the existence of the technology is not classified information.

一个不能说没有英国情报部门的问题,因为它是相当不可行的存在的技术不属於信息。

He said Britain was using Uzbek intelligence obtained from prisoners under torture.

他说英国从乌兹别克斯坦得到的情报,是乌方用酷刑从被关押的犯人那里取得的。

The Empire of the Hand was based in a vast information complex known as the Hand of Thrawn, which had been established by Thrawn even before his promotion to Vice Admiral.

手之帝国建立在被称为"索龙之手"的大量情报复合机构的基础之上。早在索龙晋升为中将之前,他就已经着手于这一复合机构的建立。

Chinese intelligence activity is widespread and has a voracious appetite for all kinds of information; political, military,commercial, scientific and technical.

中国的情报活动是普遍的,具有旺盛需求的各种信息;政治,军事,商业,科学和技术。

As the rapid development of information and network in China P.R. there are serious challenges to be faced, such as hacker intusion, computer virus, all kinds of network criminal, leakage of important imformation and infiltrate of weatern ideology and culture through internet in the country.

在我国信息化、网络化快速发展的同时,信息与网络安全也面临严重挑战:黑客入侵、计算机病毒感染、各种形式的网络犯罪、重要情报泄露以及西方国家利用互联网大肆进行意识形态和文化渗透等使我国的信息安全面临严峻形势,而且还会危及到政治、军事、经济和文化等各方面的安全。

Bibliography is a science about the laws and principles in bibliographical information work, i.

目录学是研究书目情报实践活动的内在规律的科学,也是研究文献信息揭示规律的科学。

At last, it discusses "cloaking" and "deception" in Defensive Competitive Intelligence.

查找信息泄漏的漏洞,限制敏感信息的扩散;最后探讨了反竞争情报中的&隐真&和&示假&问题。

The skill sets needed to penetrate a network for intelligence-gathering purposes in peacetime are the same skills necessary to penetrate that network for offensive action during wartime, notes a recent congressional report on China's alleged clandestine cyberattacks in the U.S. According to the report, released in October by the congressionally mandated U.S.

和平时期这些手段能够用来侵入网络,收集情报,在战争时期就可以用同样的手段侵入网络,做出攻击,一份最近的美国国会报告中如是写道,这份报告就是关于中国对美国实施的所谓秘密网络攻击。

Total Intelligence was described as "a corporate consulting firm that includes investment strategy," while "Ambassador Black" was introduced as "a twenty-eight-year veteran of the CIA," the "top counterterror guy" and a key planner for the breathtakingly rapid victory of American forces that toppled the Taliban in Afghanistan.

总的情报被形容为&企业谘询公司,其中包括投资策略&,而&大使黑&介绍了& 28年,经验丰富的美国中央情报局&,&顶端反恐家伙&和一个关键规划为breathtakingly快速的胜利,美国军队推翻阿富汗的塔利班。

第81/100页 首页 < ... 77 78 79 80 81 82 83 84 85 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。