Most starships carry some form of shielding technology, to protect it not only from the natural hazards of space travel, but also enemy attacks.
大多数星际飞船携带某种形式的护盾技术,保护它不仅不受太空航行的天然危险,也防备敌人的攻击。
Wong said that 20 other large companies, in the Internet, finance, technology, media and chemical sectors, were also targets of the December server attacks.
黄安娜说,来自互联网、金融、科技、媒体和化学领域的20家大型公司都是去年12月网络攻击的对象。
On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.
在分析数字图像中数字水印所受各种攻击的基础上,给出了一个基于数字水印技术的数字图像版权保护安全协议框架。
The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.
网络预警技术因其可预知主体受攻击的可能性和具体的指证将要发生的行为和产生的后果,而受到网络安全业界的重视。
With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
This paper introduces the technology of register code soft protection, compares advantages and disadvantages among them about security and practicability and attacks some methods successfully.
介绍了注册码软件保护技术,比较了几种注册码软件保护方案的安全性和实用性,对部分方案实施了成功的攻击。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
With the rapid development of network technology as well as continual appearance of new network applications, the emerging network attacks have brought huge challenges to network security.
随着网络技术的飞速发展和新兴网络应用的不断涌现,层出不穷的网络攻击手段给网络安全带来了严峻的挑战。
However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.
但是这种基于识别主机完整性信息的网络用户行为管理技术,不能识别出具有避绕主机完整性检查的攻击行为。
With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
Networks coding is highly susceptible to pollution attacks, but such attacks cannot be prevented by the standard technology of signature.
网络编码易遭受污染攻击的破坏,而传统的签名技术不能适用于多源网络编码。
All countries should work together to contain the abuse of information technology, oppose cyber surveillance and cyber attacks and reject arms race in cyberspace.
各国应该携手努力,共同遏制信息技术滥用,反对网络监听和网络攻击,反对网络空间军备竞赛。
Based on the discussing the principle and the technology of these attack, classified them according to the attack object and got better understanding on how to guard against these attacks.
在探讨它们攻击原理与攻击技术的基础上,按照攻击对象将它们分类,对如何防范这些攻击有了很好的理解。
This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.
本文介绍了缓冲区溢出攻击的基本原理及关键技术,总结了现有的缓冲区溢出防御方法的不足。
The technology of breaks through holding basketball is one of the attacks technology of basketball game, the aggressiveness to the person who defends of this technology is very strong.
持球突破技术是篮球进攻技术之一,此技术对防守者的攻击性很强。
As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.
入侵检测作为一种主动的安全防护技术。提供对内部攻击、外部攻击和误操作的实时保护。
An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.
作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.
另一方面,蜜罐作为一种新兴的主动防御技术,具有收集数据量小、价值高,能检测到未知攻击等优点。
On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.
另一方面,蜜罐作为一种新兴的主动防御技术,具有收集数据量小、价值高,能检测到未知攻击等优点。
应用推荐