This perfectly corresponds to the group strategy which we have called "protect and attack".
这与我们称之为“保护与进攻”的集团战略是完全相符的。
These kinds of systems are primarily designed to protect against the sort of opportunistic smash and grab attack that makes up the majority of burglaries.
这类系统主要用来防止投机取巧和掠夺,这造成了大多数入室盗窃。
At the end of the day, these kinds of systems are primarily designed to protect against the sort of opportunistic smash-and-grab attack that makes up the majority of burglaries.
归根结底,这类系统主要用于防止投机取巧的砸橱窗抢劫袭击,大部分的入室盗窃都属于这类袭击。
The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
In the next scenario, the hypothetical Web site ensures that the generated pages are properly encoded by using the XSS custom tag library and is able to protect itself from the attack.
在下一个方案中,这个虚拟网站确保生成的页面是通过使用xss定制标记库正确编码的,并且能避免攻击。
Let's identify the various known steps you should take to protect the WebSphere application Server infrastructure and applications from these four forms of attack.
我们来讨论一下要保护WebSphereApplicationServer基础设施和应用程序免受这四种形式的攻击应该采取的各种已知的步骤。
For billions of years, certain bacteria and fungi have produced chemical substances to protect them from attack from other microorganisms.
数十亿年以来,某些细菌和真菌通过产生化学物质来保护自己,抵御来自其它微生物的攻击。
Bear in mind that we come in peace, and are to protect you from any other intrusion and possible attack upon you.
记住,我们为和平而来,我们从任何入侵中保护你们,那些可能的攻击你们的企图。
The need for stability and protection. From earliest times, communities have had to keep peace among their members, defend themselves against extra attack, and protect community assets.
稳定和保护的需要始自最久远的时期,人类团体不得不在其成员间保持和平,在外来进攻中进行自卫,并且保护团体的财产。
We are now going to identify the various known steps you should take to protect the WebSphere application Server infrastructure and applications from these four forms of attack.
现在,我们将确定要保护WebSphereApplicationServer基础设施免受这四种形式的攻击应该采取的各种已知的步骤。
We were also united in our resolve to protect our nation and to bring those who committed this vicious attack to justice.
在保护我们的国家,给那些应该对这起恶性攻击负责的人以正义制裁的决心面前,我们也万众一心。
He says such changes would protect America's food sources from possible attack, reduce the spread of food poisoning and improve the economies of rural areas.
他认为这种改变将保护美国食物资源不受可能存在的攻击问题,减少食物中毒的传播,提高农村地区的经济水平。
There are lots of ways to attack Web applications, and you'll never be able to protect against all of them.
攻击Web应用程序有很多方法,您不可能阻止所有攻击方式。
Their sweeping tentacles are adapted to attack nearby corals and to protect the colony.
它们清除触须是适应于攻击附近的珊瑚和保护群体。
We were also united in our resolve to protect our nation and to bring those who committed this vicious attack to justice.
我们在保护我们的国家、将实施这一邪恶袭击的肇事者绳之与法方面也团结一致。
The diver was taking part with a police colleague in a trial of new technologies to protect ports and ships from underwater attack.
当时,该名潜水员正与一名警察同事参加一项保护港口和船只免受水下袭击的新技术的试用。
Do not forget to protect your city against disease, natural disasters and near the enemy's attack.
别忘记保护你的城市,对抗疾病、自然灾害和邻近敌人的侵袭。
The police have the power and authority to protect you from physical attack.
警察的权力和权威,以保护您的人身攻击。
The PLA has established information warfare units to develop viruses to attack enemy computer systems and networks, and tactics and measures to protect friendly computer systems and networks.
解放军已建成若干信息战单位,开发病毒攻击敌方计算机系统和网络,并研究战术和措施以保护友方计算机系统和网络。
Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users.
匿名通信可以有效地隐藏发送者或接收者的身份以及通信双方之间的关联关系,以抵抗流量分析攻击,保护用户的隐私。
There is one more thing about God being the provider of his people. He will protect us from enemies and save us from the power and attack of Satan in our lives.
神是供应者的另一个特色在于,祂会保护、拯救我们免于敌人的攻击,不让我们受到魔鬼在我们生活中布下的黑暗势力所挟制。
Similarly, cable operators are using bundles to protect their core business, which is not voice but television, as it, too, comes under attack from satellite-TV providers and now telecoms operators.
同样,电线电缆运营商也在用捆绑销售的方式保护他们的核心产业,只不过这不是语音服务,而是电视服务。 还有,他们也会遇到来自同行业如卫星电视提供商,现在是电信运营商的竞争压力。
We were also united in our resolve, to protect our nation and to — to bring those who committed this vicious attack to justice.
我们有着共同的决心,即矢志保卫我们的国家,并把那些发动了这场邪恶袭击的人绳之以法。
I found out that the skin of almonds contains harmful acids used to protect it, naturally, from insect attack and fungus.
我发现了杏仁皮肤包含用于保护它,自然由昆虫和真菌的攻击,有害的酸。
Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.
入侵检测技术就是这样一种动态策略,它通过对网络系统实时监控,来达到动态保护的目的。
This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.
此安全协议能够有效保护数据完整性、保护信息的不可抵赖、防止重发攻击等。
The Ming finds out and quickly dispatches assassins to attack the research lab, but Choi Haesan, the man in charge of the protect the weapon's secret.
明朝间谍得知此计划后派出杀手袭击火炮秘密研究所,为了不让神机箭的秘方落入敌人手中,研发队伍负责人连同自己引爆了所有研究材料。
The Ming finds out and quickly dispatches assassins to attack the research lab, but Choi Haesan, the man in charge of the protect the weapon's secret.
明朝间谍得知此计划后派出杀手袭击火炮秘密研究所,为了不让神机箭的秘方落入敌人手中,研发队伍负责人连同自己引爆了所有研究材料。
应用推荐