• 这儿有个叫Deadbolt防御程序,关系到个只剩小时女孩能帮什么吗?

    I got a program called deadbolt defense and a girl with only a couple of hours to live, so what do you know?

    youdao

  • 承接纵深防御程序

    These are procedural steps following the "Depth in Defense" approach.

    youdao

  • 尝试为应用程序整合防御编程、契约式设计一种叫做OVal的易用通用验证框架

    Find out what happens when you combine defensive programming, design by contract, and an easy-to-use generic validation framework called OVal.

    youdao

  • 他们时间我们进入严格变更控制程序之前看到软件的进展情况,ScottAmbler喜欢它们称之为“变更防御程序

    They have time to start to see their software evolve before we subject them to strict change control procedures, or as Scott Ambler likes to call them, "change prevention" procedures.

    youdao

  • 性能保持最优水平一个方法开发Web服务度量应用程序(请参见8),测定深度防御协调程度。

    One way of maintaining performance at an optimal level is to develop a Web service metrics application (see Figure 8) to measure how well the defense in depths are performing in the orchestra.

    youdao

  • 精确打击信息作战基本程序消除信息,切断信道,干扰信宿末端防御组成。

    The basic procedure of anti-precision strike information campaign consists of eliminating information, cutting off channel, disturbing useful information and end defense.

    youdao

  • 客体要件民事诉讼权利包括当事人提出攻击防御方法当事人提出程序事项异议权。

    The object element is rights of civil action, including parties to put forward methods of attack and defense and raise objections to procedural matters.

    youdao

  • 程序防御——防御墙门!

    New procedural Defensive Wall addition: Defensive Wall Gate!

    youdao

  • 原告于第二审程序为诉之追加不仅关涉被告防御行使关系利益之维护。

    The increase of proceeding request in the procedure of trial on appeal is not only relation to the exercise of defense rights of the defendant, but also to the benefit of judicial rank.

    youdao

  • 基于最小特权原理,从分析进程访问权限出发,提出一种防御恶意程序攻击的数据保护模型

    After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.

    youdao

  • 详细程序代码检查最好防御方式多数公司没有时间资源全面做好这件事

    Detailed code reviews are the best defense, but most companies do not have the time or resources to do this adequately.

    youdao

  • 具体恶意诉讼类型可以其分为滥用起诉型、滥用防御权型、滥用诉讼程序型、虚假诉讼型、单方欺诈型重复诉讼型。

    Malicious litigation can be divided into six types, abusing of the right to sue, abusing of the defensive right, abusing of judicial proceeding, false lawsuits, mendacious suit and repeated suit.

    youdao

  • 禁用栈执行、使用安全C库支持编译器技术当前最新几种防御技术进行了讨论,并给出了部分具体的实例程序源代码

    Some latest defense techniques such as the prevention of using stack, and using safety C to support and compiler techniques are discussed. Some specific program codes are given as examples.

    youdao

  • 禁用栈执行、使用安全C库支持编译器技术当前最新几种防御技术进行了讨论,并给出了部分具体的实例程序源代码

    Some latest defense techniques such as the prevention of using stack, and using safety C to support and compiler techniques are discussed. Some specific program codes are given as examples.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定