英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

They will restore their energy immediately after the attack, even before the enemy retaliates.

伴随着每一次成功的攻击,吸血鬼都会从敌人身上吸取生命活力,这个恢复效果会在攻击后立刻完成。

Several nations could hit targets anywhere in the world, but regional salvos might be more likely.

有几个国家有能力攻击世界上任何地方,但最有可能的攻击方式,还是局部密集的轰炸。

If that unit is attacked while it slumbers, the attacking unit comes under the effect of Nightmare.

如果目标单位在噩梦期间被普通攻击唤醒,那么对其进行普通攻击的单位将因此受到噩梦的影响。

If that unit is attacked while it slumbers, the attacking unit comes under the effect of Nightmare.

假如目标单位在噩梦期间被普通攻击唤醒,那么对其进行普通攻击的单位将因此受到噩梦的影响。

In 1916, the British launched another major attack out of South Africa, commanded by the South African, Jan Smuts, with 45,000 troops.

1916年,英国从南非发动了另一场主要攻击,这次攻击由南非人让·斯姆茨指挥45000人。

In 1916, the British launched another major attack out of South Africa, commanded by the South African, Jan Smuts, with 45,000 troops.

春秋中文社区http://bbs.cqzg.cn 1916年,英国从南非发动了另一场主要攻击,这次攻击由南非人让·斯姆茨指挥45000人。

Some of the more effective cyber snoops and vandals may not be government employees. Rather, as pirates would once loot on behalf of particular governments, a few of today's more effective hackers may be freelancers acting perhaps with tacit official approval.

一些更有效的网络攻击可能并非政府人员所为,但是,就像海盗有时也会代表部分政府利益一样,现在的一些看似随意但极为有效的黑客攻击很可能得到了政府的默许。

Three characteristics of spoofed DDoS attacks are applied to design the detection scheme.

侦测攻击的方法是根据攻击的三个特徵来设计。

First, the sources of attack traffic can be spoofed so that victims cannot identify the real sources of attacks.

第一,攻击流量的源可以欺骗,于是受害者不能鉴别攻击的真实源。

Distributed Denial of Service attacks, especially spoofed DDoS attacks, are a serious threat to the Internet.

分散式阻断攻击对网路是一个严重的威胁,尤其是伪造来源的分散式阻断攻击,更是严重。

第46/100页 首页 < ... 42 43 44 45 46 47 48 49 50 ... > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。