• 依据保护网络类型采用边界防护系统保护级别采取不同方式入侵检测系统。

    According to the type of network to be protected, boundary protection system adopted and different protection rank, the mode of entering into detection system is ranked either.

    youdao

  • 由于集中监测系统安全系统,从系统边界防护角度考虑,应该集中监测系统和其它系统之间通信接口采用安全通信协议

    As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.

    youdao

  • 时候,当土著人夺取防护西部边界那些城堡时,他们就使用鼓声作为预先示警。

    At the time, drums were used to fore warn that the natives were going to capture the forts, which guarded the western frontier.

    youdao

  • 基于主机入侵防护系统HIPS技术保护网络边界

    Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .

    youdao

  • 基于主机入侵防护系统HIPS技术保护网络边界

    Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定