Denial of Service (DoS) attack protection.
拒绝服务(Denialof Service,DoS)攻击保护。
We employ enterprise-level DDOS attack protection service.
我们采用企业级的DDOS攻击的保护服务。
These packs allow users to tailor the attack protection to specific types.
这些包允许用户对攻击保护进行类型定制。
Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.
安全性:从硬件级别上实现故障和安全性的隔离,平台内置arp攻击防护能力,分布式和规模化提升防ddos攻击能力。
I mean, you might think it was for protection or something, but there has been no evidence found yet of any violent attack that would indicate that kind of danger.
我的意思是,你可能会认为这是为了保护或其他什么,但目前还没有发现任何暴力袭击的证据表明这种危险。
But they may also be used in a predatory way by women who are using the protection of anonymity to attack men who may have done nothing more than fail to notice them.
但是他们也可以被用作攻击性的途径,妇女可能在匿名的保护下,攻击除了没有关注她们,并无任何错误的男性。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.
自动下线是保护到给定系统(通常但并不必须是远程的)的休眠会话不被恶意利用,帮助降低受到恶意攻击的风险。
"It was a targeted attack," said Kellermann, who serves on the International Cyber Security Protection Alliance.
工作并在世界银行库房中负责网络情报安全。 先正在国际网络安全保护联盟工作的凯勒曼说,“这是有目地性的攻击”。
According to Rafael, an Israeli defence contractor, a ship's protection gear often costs as much as its attack weaponry.
根据拉斐尔(一家以色列防御承包商)的分析,一艘军舰的防御武器设备的费用几乎与它装备的进攻性武器费用相当。
The need for stability and protection. From earliest times, communities have had to keep peace among their members, defend themselves against extra attack, and protect community assets.
稳定和保护的需要始自最久远的时期,人类团体不得不在其成员间保持和平,在外来进攻中进行自卫,并且保护团体的财产。
If you are using XML Threat protection, make sure it does not block your test (because of suspecting XML-DOS Attack).
如果使用的是XMLThreatprotection,确保它不会妨碍您的测试(出现可疑的XML - DOS攻击)。
A strong defence system offers protection from sudden attack by the enemy.
坚固的防御系统提供保护以防备敌人的突袭。
However police have told reporters that there is no evidence to suggest that cow protection groups were involved in the attack.
不过警察告诉记者,目前尚无证据显示圣牛保护组织与本次袭击有关。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
The rights to ask for property protection and free from personal attack.
有权要求财物保护、免受人身攻击。
Conclusion: the angina attack before infarction can produce the ischemic preconditioning on myocardium that provides myocardium with definite protection.
结论:梗塞前心绞痛发作对心肌产生的缺血预适应有明确的心肌保护作用。
Aiming at the status that it is easier for secure chip to be attacked by error inject attack, this paper proposes a protection scheme of error inject attack for secure chip.
针对安全芯片容易遭受错误诱导攻击的情况,提出一种安全芯片错误诱导攻击防护方案。
Astaxanthin may play a key role in the protection of cell membranes against free radical attack, as well as support of the immune system and cardiovascular health.
虾青素可能在细胞膜免受自由基攻击保护的关键作用,以及作为免疫系统和心血管健康的支持。
The spur-dike is a common important building which is usually used in river course improvement projects, controlling river trend, bend protection, beam attack sand and high water levels.
丁坝是河道及航道整治工程中一种常用的重要建筑物,具有控制河势、保护岸滩、束水攻沙及壅高水位等多种功能。
I have been researching into actual examples of how to attack the Validate Request protection.
我一直在研究如何攻击实例验证请求保护。
The "Protection" covers static and dynamic malware detection, including real-world 0-day attack testing.
“防护”包括静态与动态恶意软件检测,涵盖了零日漏洞攻击等测试。
Enemies could attack you and kill or bomb you, and you had little protection against them.
敌人可能会攻击你,杀害你或抢劫你的财富,而你却毫无还手之力。
The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.
网络的攻击与防护是一对矛盾,严格地说,没有绝对的网络安全。
The material has the protection of the human immune system cells from HIV attack.
该物质具有保护人体免疫系统的细胞不受艾滋病毒侵袭的作用。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
应用推荐