• Most starships carry some form of shielding technology, to protect it not only from the natural hazards of space travel, but also enemy attacks.

    大多数星际飞船携带某种形式护盾技术保护不仅不受太空航行天然危险防备敌人攻击

    youdao

  • Wong said that 20 other large companies, in the Internet, finance, technology, media and chemical sectors, were also targets of the December server attacks.

    黄安娜,来自互联网金融科技媒体化学领域20大型公司都是去年12月网络攻击的对象

    youdao

  • On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.

    分析数字图像中数字水印所受各种攻击基础给出一个基于数字水印技术的数字图像版权保护安全协议框架。

    youdao

  • The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.

    网络预警技术预知主体受攻击可能性具体指证将要发生的行为和产生的后果,而受到网络安全业界的重视

    youdao

  • With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。

    youdao

  • This paper introduces the technology of register code soft protection, compares advantages and disadvantages among them about security and practicability and attacks some methods successfully.

    介绍注册软件保护技术比较了几种注册码软件保护方案的安全性实用性部分方案实施了成功的攻击

    youdao

  • For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.

    对于当前混合型攻击层出不穷安全威胁传统基于单一设备网络安全防护技术己显得无能为力了

    youdao

  • With the rapid development of network technology as well as continual appearance of new network applications, the emerging network attacks have brought huge challenges to network security.

    随着网络技术飞速发展新兴网络应用不断涌现层出不穷的网络攻击手段网络安全带来了严峻的挑战。

    youdao

  • However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.

    但是这种基于识别主机完整性信息网络用户行为管理技术不能识别出具有绕主机完整性检查攻击行为

    youdao

  • With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。

    youdao

  • Networks coding is highly susceptible to pollution attacks, but such attacks cannot be prevented by the standard technology of signature.

    网络编码遭受污染攻击破坏,传统的签名技术不能适用于多源网络编码。

    youdao

  • All countries should work together to contain the abuse of information technology, oppose cyber surveillance and cyber attacks and reject arms race in cyberspace.

    各国应该携手努力,共同遏制信息技术滥用反对网络监听网络攻击反对网络空间军备竞赛

    youdao

  • Based on the discussing the principle and the technology of these attack, classified them according to the attack object and got better understanding on how to guard against these attacks.

    探讨它们攻击原理攻击技术基础上,按照攻击对象它们分类如何防范这些攻击有了很好的理解

    youdao

  • This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.

    本文介绍了缓冲区溢出攻击基本原理关键技术总结了现有缓冲区溢出防御方法不足

    youdao

  • The technology of breaks through holding basketball is one of the attacks technology of basketball game, the aggressiveness to the person who defends of this technology is very strong.

    持球突破技术篮球进攻技术之一技术对防守攻击性很强。

    youdao

  • As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.

    入侵检测作为一种主动安全防护技术提供内部攻击外部攻击误操作实时保护。

    youdao

  • An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.

    作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁攻击

    youdao

  • On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.

    一方面,蜜罐作为一种新兴主动防御技术具有收集数据价值检测到未知攻击优点

    youdao

  • On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.

    一方面,蜜罐作为一种新兴主动防御技术具有收集数据价值检测到未知攻击优点

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定