并且这对于基础攻击力和补刀也是没有帮助的。
猫形态,猫形态基础攻击加成在切换区域和登陆后将被正确计算。
Cat form - the attack power bonus from the base cat form will now calculate correctly on zoning or logging in.
仍然是糟糕的,一个力量护腕提供了更多的HP和额外的基础攻击力。
Still abysmal, a bracer at least provides some HP and extra base damage.
坏的主意,这个格挡了物理伤害,但是不能提供回复,虽然可能有一些的基础攻击力的加成。
Bad idea, it blocks physical damage, provides no regen, and maybe a bit of base damage.
对于近战英雄,这是良好的回复和基础攻击,但是不是很好,因为它不能提供HP以及更快的的回复速度。
On a melee hero, this is decent regen and base damage, but not great, because it gives no HP, and no fast regen.
每当你使用技能,你的下一次基础攻击的伤害将提高高75%并造成技能伤害。最多叠加3层。
When you use an Ability, increase your next Basic Attack by 75% and cause it to deal Ability damage. Stacks up to 3 times.
一种保护在文档透明性基础上构建的敏感数据免受攻击的方法是通过加密部分XML文档来降低透明性。
One way to protect sensitive data from attacks built on document transparency is to curtail the transparency by encrypting parts of XML documents.
我们的使命制造解决方案建立情报基础上,通过网络攻击进行有效打击。
Our Mission Maker solutions build in the intelligence to effectively fight through cyber attacks.
考虑示例1 (a),当然,这改写自Windows攻击,它构成了此类攻击载体的基础。
Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.
当然,移植到云基础设施可能会改变攻击者的访问级别和动机,以及工作量和风险——这是在以后的工作中必须考虑的一个事实。
Of course, moving to a cloud infrastructure might change the attackers' access level and motivation, as well as the effort and risk - a fact that must be considered as future work.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
因为通常不可能追踪到攻击者,对互联网站和网络基础结构的攻击,及其对安全信息的危害,是一个异常棘手的问题。
Attacks on Internet sites and infrastructure, and the compromise of secure information, pose a particularly tricky problem because it is usually impossible to trace an attack back to its instigator.
一条路径的带宽受到网络的物理属性的限制—攻击者在未获得更多基础设施的情况下很难增加带宽。
Bandwidth of a path is capped by the physical properties of the network-an attacker cannot easily increase bandwidth without acquiring more infrastructure.
虽然这是孩子们玩的一个游戏,但却也是在公钥基础设施(PKI)上可能发生的一种很严重的攻击。
It's a game played by children, but it's also a serious attack that can occur on public key infrastructures (PKI).
很多关于网络战争的讨论把焦点放在“数字珍珠港”的可能性上面,在这种情形下面,国家的能源网以及其它关键基础设施被攻击者弄瘫痪。
Much of the discussion of cyberwar has focused on the potential for a "digital Pearl Harbour", in which a country's power grids and other critical infrastructure are disabled by attackers.
这为将来的开发工作如包列表索引与分割打下了基础,而这些工作会减少一些攻击向量。
This has laid the groundwork for future developments, such as packet list indices and partitions, which will help with some of the attack vectors down the road.
2010年,更多的黑客将攻击互联网,因为越来越多的关键基础设施如电网将实现网络互连。
In 2010, more hackers will be attacking the Internet because more critical infrastructure like the electric grid will be online.
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
他还警告说,要防止英国的核心基础设施遭到来自网络的攻击,他们还有更多的事情要做。
He also warned more would need to be done to protect the UK's core infrastructure from cyber attack.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
在这样的测试期间,在CEH尝试攻击系统之前,应该为其提供有关基础设施的最少信息。
During such a test, the CEH is given minimal information about the infrastructure before he or she attempts to hack the system.
美国的东半部分尤其容易受到攻击,因为那里的电力基础设施是高度互联的,所以功能失灵就像多米诺骨牌一样发生。
The eastern half of the U.S. is particularly vulnerable, because the power infrastructure is highly interconnected, so failures could easily cascade like chains of dominoes.
鉴于近期我们的基础设施遭到攻击,我们决定确保每个人都能获取到我们的内容。
Due to recent attacks on our infrastructure, we've decided to make sure everyone can reach our content.
鉴于近期我们的基础设施遭到攻击,我们决定确保每个人都能获取到我们的内容。
Due to recent attacks on our infrastructure, we've decided to make sure everyone can reach our content.
应用推荐