易受攻击的
- 与 易受攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Rich people feel vulnerable, and they see our products as part of the solution, says Caballero.
卡瓦列罗表示:"富人感到易受攻击,他们把我们的产品看作应对之策的一部分。"
-
Without the cloudy water the chub became vulnerable.
没有了浑浊的水,弓背鮭极易受攻击。
-
But Mesopotamia had no clear boundaries, making it vulnerable to attack.
但是,美索不达米亚没有明确的边界线,使它易受攻击。
-
Mitchel, Lucien's 15years old son, is much quieter than his father and finds it less of a problem to appear vulnerable; much to his father's annoyance.
米切尔,路西恩15岁的儿子,比他父亲要安静得多,而且认为暴露自己易受攻击并不像他父亲烦恼地那样是个多大的问题。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
We will be ever vigilant and never vulnerable, and we will fight our wars against poverty, ignorance and injustice, for those are the enemies against which our force can be honorably marshaled
我们将永远保持警惕,永远不会易受攻击,我们将向贫困、愚昧和非正义开战,因为这些是可以光荣地使用我们的力量去对付的敌人。
-
More controversial will be TNK-BP, an Anglo-Russian company that is half-owned by BP and half by a clutch of tycoons (unpopular and therefore vulnerable).
对 TNK-BP 的处置则更富争议。 TNK-BP 是一家英-俄公司,一半属于 BP,一半属于一些企业大亨(不受欢迎,因此易受攻击)。
-
Anxiety about the vulnerability of oilfields sundered the region into American and Soviet camps, and the cold war's end brought the briefest respites.
阿拉伯人担心油田易受攻击,纷纷加入美苏两大阵营,冷战结束后的缓解也转瞬即逝。(拆成短句稍好点,lz再斟酌。
-
This paper starts with latent exposure to attack the network of government organization, combining the experience and the technology of network safety management, discusses the feasibility and correlation for strengthening self guard configuration and utilizing safe reinforcing cover to find the solution scheme that suits the network safety of government organization.
该文从政府机关网络易受攻击的潜在暴露点入手,结合网络安全管理的技术和经验,对强化自身的防范配置、运用安全加固套件的可行性和相关性进行了研究和探讨,以求找到适合于政府机关网络安全的解决方案。
-
Itll fight if it has to, but its vulnerable out in the open.
在必须的时候它会发威,但它在野外易受攻击。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。