攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
But with the increasing maturity of Cracker and the increasing attack means, pure firewall strategy cant satisfy the requests. And at the same time, the net environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling leak.
而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂多样,单纯的防火墙策略已经无法满足对安全高度敏感的部门的需要,网络的防卫必须采用一种纵深的、多样的手段。
-
But with the increasing maturity of Cracker and the increasing attack means, pure firewall strategy cant satisfy the requests. At the same time, the network environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling leak.
而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂多样,单纯的防火墙策略已经无法满足对安全高度敏感的部门的需要,网络的防卫必须采用一种纵深的、多样的手段。
-
To mitigate the impacts of DDOS attacks, it is important to develop defenses that can both detect and react against ongoing attacks.
为了减轻DDOS攻击的影响,重要的是开发对正在进行的攻击进行探测并且响应的防御系统。
-
Put cavalry on the side of the battlefield and order them to attack the rearmost enemies. During combat they will try to outflank the enemy and attack his rear troops and commanders.
把你的骑兵放在队伍侧翼,然后为其下达"攻击最远敌人"的命令,他们就会在战斗中试图从侧翼绕过敌人然后包抄攻击对方的后方。
-
Various theories as to the nature of the soul have claimed to be reconcilable with the tenet of immortality, but it is a sure instinct that leads us to suspect every attack on the substantiality or spirituality of the soul as an assault on the belief in existence after death.
各种理论的性质,灵魂都声称自己调和与不朽的宗旨,但它是一个肯定的本能,导致我们怀疑一切攻击或精神充实的灵魂的攻击中存在的信仰后,死亡。
-
To validate the effectiveness of this kind of DDoS attacks under IPSec, we redid the same experiment on the IPSec security link as Section 3.2 except the Smurf attack.
为了验证IPSec下DDoS攻击的有效性,我们在IPSec安全连接上重做和3.2节中一样的实验,除了Smurf攻击。
-
Have implemented a Trojan Horse system, named SAKER which introduces advanced hiding technique, spreading technique and safe communicating technique.
主要完成了以下工作:(1)研究了网络信息对抗技术,重点研究了网络攻击技术。(2)深入研究了基于木马的网络攻击技术。
-
In this paper, a new way of self-protecting network from attacker when network is in potential risk within campus network is proposed which could potentially protect the network security.
这里要实现的网络自防御攻击系统是一种在校园网络受到内部潜在的安全威胁时,如何及时将有害攻击源或被感染源隔离起来,及时通知用户采取安全措施,从而保证网络安全稳定运行。
-
Warrior Servitor (77): Increases summon's max HP, HP regen, P.def, P.atk, atk speed, accuracy for a period of time.
战士使魔(77):一段时间增量召唤兽了最大HP, HP回复,物理防御,物理攻击,攻击速度,命中率。
-
It is composed of units capable of delivering ship-to-shore assault troops, such as Tarawa-class and Wasp-class amphibious assault ships, and landing craft.
由具备投送"由舰到岸"攻击部队能力的各单位组成。如"塔拉瓦"级和"黄蜂"级两栖攻击舰以及登陆艇等。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。