英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

But the pirates continue to brazenly attack vulnerable vessels.

但是海盗仍然肆无忌惮地攻击容易受到攻击的船只。

For example:The electronics cheat. the brush-off service attack of the smurf attack and other types.

电子欺骗。smurf 攻击以及其它类型的拒绝服务攻击

Anderson and Bushman proposed the General Aggressive Model, which could explain both the development of aggressive behavior and the difference of individual vulnerability to the effects of violent video games, and they advocated the effects, including short-term effects and long-term effects.

Anderson和Bushman在2002年提出了一般攻击模型,可解释青少年期间攻击行为的发展与暴力电子游戏影响易感性的个体差异,并提出游戏对于青少年的影响分为短期与长期效应。

"By using a virus that only attacks bacteria, called a phage – and some phages only attack specific types of bacteria – we can treat infections by targeting the exact strain of bacteria causing the disease", says Ana Toribio from the Wellcome Trust Sanger Institute in Hinxton, Cambridgeshire, UK.

"用一种病毒只攻击细菌,称为噬菌体-有些噬菌体只攻击特定种类的细菌-我们可以把感染对象的确切菌种造成病",安娜说,从小米威康信托桑格研究所分部,剑桥,英国。

Less than a week after the fatal Camelback accident , another team of climbers encountered the , but avoided trouble simply by keeping quiet and cautiously scooting away .

在这起攻击意外的一个星期内,另一组攀岩团体也遇上了杀人蜂,但是他们小心安静的迅速离开现场,避免了被蜜蜂攻击的结果。

Less than a week after the fatal Camelback accident , another team of climbers encountered the AHBs , but avoided trouble simply by keeping quiet and cautiously scooting away .

在这起攻击意外的一个星期内,另一组攀岩团体也遇上了杀人蜂,但是他们小心安静的迅速离开现场,避免了被蜜蜂攻击的结果。

Based on the vulnerability analysis to the carrier plane group and aimed to the issue of quantitative,the damage effectiveness of submunition against carrier plane group is analyzed,the model of pixel-simulation is established,and the computer simulating calculation of damage effectiveness of the shipboard aircraft group under the attacking of many missiles is carried out.

是子母弹对航空母舰毁伤效果分析的第三部分。在对舰载机群进行易损性分析的基础上,针对子母弹战斗部攻击舰载机群毁伤效果的定量分析问题,提出了基于像素仿真的模拟方法,实现了多弹攻击下的舰载机群毁伤效果的计算机模拟计算。本研究对航空母舰毁伤效果的评估和火力计划方案的制定具有重要指导意义

Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. vtc authors brad causey and bobby rogers present computer security from an angle that aims to put you into the seat, to protect your network through ethical hacking and penetration testing.

了解哪些攻击可能被用来攻击你的系统已经成为一项基本的安全常识。vtc 的作者 brad causey 和 bobby rogers 通过黑客和渗透测试来展示给你电脑安全方面的问题,以保护你的网络。

In this short moment it was impossible for the light cavalryman to parry and then cut. The opponent could thrust and be far out of reach within a second.

在电光火石的瞬间,你休想用武器去招架敌人的攻击然后再砍回去,有这功夫敌人早与你擦身而过然后调转马头准备第二次攻击了。

"Character assassination:a vicious personal verbal attack , especially one intended to destroy or damage a public figure's reputation."

诽谤:恶意的人身言语攻击,尤指意在破坏或玷污某位公众人物声誉的诽谤。"闪电战"指一次攻击或一次战役。

第16/100页 首页 < ... 12 13 14 15 16 17 18 19 20 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。