二月十号将是大部分人,包括那些评论者看这文档的第一次机会。
February 10th will be the first chance most people, including the critics, have to look at the document.
一旦完成了最初的空格问题,并且从这个方面来看这些文档是相同时,接着需要处理外部实体解析。
Once you've gotten past the initial issues of whitespace, and your documents are identical in that respect, you need to deal with external entity resolution.
回头查看一下清单15,看看这是文档中的哪个部分。
Look back at Listing 15 to get an idea as to what part of the document this is.
文档库定义两个域角色:Editors被授权修改文档库的内容,而Readers只能查看这些内容。
The document library defines two domain roles: Editors are permitted to modify the contents of the document library, whereas Readers can only view the contents.
用试凑法,攻击者可以检查 XML文档的各个子节点并通过查看这个XPath表达式是否能促成成功的身份验证以收集信息。
By trial and error, the attacker can check the various child nodes of the XML document and gather information by seeing if this XPath expression results in a successful authentication.
如果仔细查看这些表定义示例,将会注意到它们都没有指定将XML文档的内部结构存储到Comments或contactinfo列。
If you look closely at these table definition examples, you'll notice that neither specified the internal structure of the XML documents to be stored in the Comments or Contactinfo columns.
建议您看一看这些文档,这样才能将这个ruby库的全部威力释放出来。
I suggest that you take a look at the documents to unleash the full power of this Ruby library.
这个文档根据系统日志和击键记录一步步地看这个被入侵的系统上发生了些什么。
The paper goes through step by step on a system that was compromised, with system logs and keystrokes to verify each step.
这个文档根据系统日志和击键记录一步步地看这个被入侵的系统上发生了些什么。
The paper goes through step by step on a system that was compromised, with system logs and keystrokes to verify each step.
应用推荐