攻击的
- 与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Protocol analysis technology resolve several main problems: accurateness, capability, service, integration with other security system.
它是新一代IDS系统探测攻击手法的主要技术,它利用网络协议的高度规则性快速探测攻击的存在,因而它与具体的协议格式息息相关。
-
We are being attacked by a society which is motivated by the most extreme form of racism known in the world today.
受到攻击的是我们,而攻击我们的,是受到有史以来最为恶劣的种族主义思想激励的一个团体。
-
This article discusses the theories and technology of networking inbreaking check and warning control. Analysis the possibilities of attacking by hacker and means to meet this attacking and advance a new idea setting traps and comes true on Linux.
摘 要:本文讨论了网络[url=http://www.7747.net]入侵检测与预警的各种理论和技术,分析了[url=http://www.7747.net]黑客攻击的各种可能性以及目前对付[url=http://www.7747.net]黑客攻击的各种手段,提出了设置陷阱的新思路,并在 Linux 上实现。
-
In the case of attack by KE Projectiles the interceptors are exploded in front of them, to tilt them downwards so that they strike their targets yawed and therefore with much reduced penetration capability.
在动能弹攻击的情况下,拦截弹在动能弹前面爆炸,并使动能弹向下倾斜,因而动能弹攻击的是一个偏斜的目标,这就大大减小了侵彻威力。
-
The ground element was under attack by indirect fire from insurgents attacking their small Afghan National Army outpost in eastern Zabul Province.
地面部分正由间接火力攻击的武装分子攻击他们的小阿富汗国民军在东部的查布尔省前哨。
-
When this Attack Position card is attacked by an opponent's monster, by sending "Uria Lord of Searing Flames","Hamon Lord of Striking Thunder" or "Raviel Lord of Phantasms" from your hand or Deck to the Graveyard, place 1 Genma Counter on this card.
攻击表示的这张卡被对方怪兽攻击的时候,可以将卡组和手牌的「神炎皇尤利亚」「降雷皇哈蒙」「幻魔皇拉维尔」送入墓地,在这张卡上放置3个幻魔指示物。
-
While both Wheeler and Sprey are respected academics, other attacks on the Joint Strike Fighter program have come from less reputable sources.
虽然惠勒和Sprey得到尊重的学者,其他攻击的联合攻击战斗机计划来自信誉较低的来源。
-
To cope with the Air-to-Ground attack effectiveness assessment, taking single plane attacking ground target with aerial defence support as study object, based on markov stochastic process theory, the combat model was put forward and the system transfer matrix was derived, too.
针对作战飞机对地攻击的效能评估问题,以单机对具有防空火力支援的敌地面目标打击为研究对象,运用markov随机过程理论,建立了攻击机对地攻击过程的动态模型,推导了状态转移矩阵。
-
Attack is the injure another person and does not wish to accept for other behavior that shows any forms are purposeful, the extreme form of attack is rough stuff.
梗概: 攻击是指任何形式有目的的伤害他人而为他人不愿接受的行为,攻击的极端形式就是暴力行为。
-
Directly, or the incident data was forward to the local CERT.
及网络钓鱼攻击的组织进行了直接联系,或者将这些攻击相关的数据转交给当地的应急响应组
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?