我这儿有个叫Deadbolt的防御程序,关系到一个只剩几小时能活的女孩,你能帮点什么吗?
I got a program called deadbolt defense and a girl with only a couple of hours to live, so what do you know?
这是承接“纵深防御”的程序。
These are procedural steps following the "Depth in Defense" approach.
尝试为应用程序整合进防御性编程、契约式设计和一种叫做OVal的易用的通用验证框架。
Find out what happens when you combine defensive programming, design by contract, and an easy-to-use generic validation framework called OVal.
他们有时间在我们进入严格的变更控制程序之前看到软件的进展情况,ScottAmbler喜欢将它们称之为“变更防御”程序。
They have time to start to see their software evolve before we subject them to strict change control procedures, or as Scott Ambler likes to call them, "change prevention" procedures.
将性能保持在最优水平的一个方法是开发一个Web服务度量应用程序(请参见图8),以测定深度防御的协调程度。
One way of maintaining performance at an optimal level is to develop a Web service metrics application (see Figure 8) to measure how well the defense in depths are performing in the orchestra.
防精确打击信息作战的基本程序可由消除信息,切断信道,干扰信宿和末端防御组成。
The basic procedure of anti-precision strike information campaign consists of eliminating information, cutting off channel, disturbing useful information and end defense.
客体要件为民事诉讼权利,包括当事人提出攻击防御方法权和当事人提出程序事项异议权。
The object element is rights of civil action, including parties to put forward methods of attack and defense and raise objections to procedural matters.
新程序性防御墙——防御墙门!
New procedural Defensive Wall addition: Defensive Wall Gate!
原告于第二审程序中为诉之追加不仅关涉被告防御权之行使,更关系到审级利益之维护。
The increase of proceeding request in the procedure of trial on appeal is not only relation to the exercise of defense rights of the defendant, but also to the benefit of judicial rank.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
详细的程序代码检查是最好的防御方式,但多数公司没有时间或资源来全面做好这件事。
Detailed code reviews are the best defense, but most companies do not have the time or resources to do this adequately.
具体到恶意诉讼的类型,可以将其分为滥用起诉权型、滥用防御权型、滥用诉讼程序型、虚假诉讼型、单方欺诈型和重复诉讼型。
Malicious litigation can be divided into six types, abusing of the right to sue, abusing of the defensive right, abusing of judicial proceeding, false lawsuits, mendacious suit and repeated suit.
对“禁用栈执行、使用安全C库支持、编译器技术”当前最新的几种防御技术进行了讨论,并给出了部分具体的实例程序源代码。
Some latest defense techniques such as the prevention of using stack, and using safety C to support and compiler techniques are discussed. Some specific program codes are given as examples.
对“禁用栈执行、使用安全C库支持、编译器技术”当前最新的几种防御技术进行了讨论,并给出了部分具体的实例程序源代码。
Some latest defense techniques such as the prevention of using stack, and using safety C to support and compiler techniques are discussed. Some specific program codes are given as examples.
应用推荐