In this attack, an attacker USES weaknesses in the design of the database or Web page to extract information or even manipulate information within the database.
在这种攻击中,攻击者利用数据库或web页面的设计缺陷从数据库提取信息,甚至操纵数据库的信息。
Lapatinib is a product of the growing field of molecular medicine-the design of drugs to attack specific protein molecules associated with particular diseases.
Lapatinib是一种分子药物市场蓬勃发展的产品——被设计用来靶向治疗与疾病相关的特定的蛋白质分子。
This is the design philosophy that leads to overstuffed websites that resemble Times Square in their relentless attack on the senses.
就是这种设计哲学导致了类似时代广场这种冗长的网站,给人类感官以无情的打击。
The designs for the clone barracks dates back to concepts developed for Star Wars: Episode II Attack of the Clones, which were explored by the concept design team back in 2000, but never finished.
克隆人营房的设计可以回溯到为《星球大战:第二部——克隆人的进攻》打造出来的概念,2000年时的概念设计小组对这些概念进行了探索,但从未完成设计。
This gentleman had desisted his attack, finding no room to expect the accomplishment of his design.
这位公子因为看出他的计划没有实现的希望,就停止了进攻。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
图像水印的算法设计和攻击技术是互相促进的对立面。
Note that still the velocity is constant along the desired segments at the corresponding design angles of attack.
看到的依然是不断沿着速度预期在相应的环节设计迎角。
"He was an early influence for me as a representative of the modern avantgarde intersection between art and design, " said Hadid, who died earlier this year following a sudden heart attack.
哈迪德在今年早些时候因心脏病突发死亡,她曾说:“他作为现代前卫的艺术和设计之间融合的代表,在早期对我有着很大的影响。”
TAIL DESIGN : The STOL CH 801 tail sections are designed to provide maximum effectiveness (control) at slow speeds and at high angles of attack.
尾部设计:甲烷的短距起降801尾节的目的是提供在高攻角的最大效益(控制)的速度和缓慢。
They contrived to murder their boss; design a new sales strategy; plan an attack.
他们设计谋杀老板;设计一个新销售策略;设计一次进攻。
This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.
本文首先研究了智能决策支持系统的体系结构、集成方式和知识库设计,然后对系统漏洞和网络攻击模式进行了深入探讨。
In the design of watermark encoder, through the combination of side information and watermark, our system also obtained the robustness against copy attack.
在水印编码的设计上,通过将载体的个性信息与水印融合,使整个系统对拷贝攻击也具有鲁棒性。
With the appearance of algebraic attack, some new criterions for design of cryptstems are added.
新的攻击方法的出现必将对密码算法的设计提出新的要求。
Especially, the masking design in S-box of advanced encryption standard can make the algorithm safer to against linear attack.
特别对于高级加密标准算法的S盒设计,增加掩码设计可以加强抗线性攻击安全程度。
In order to attack the target with big impact Angle, over compensation of gravity is added to the design.
为了实现大落角攻击目标,进行了末制导过重补设计。
I need to design an application that protects some data in a database against root attack.
我需要设计一个应用程序,以保护数据库中的一些数据库免受根攻击。
My attack is not based on quibbles about rebuilding methods or hairsplitting about fashions in design.
我的抨击并不是以关于改建手法的模棱两可的双关语为基础,也不是对设计的时尚吹毛求疵。
Second, the paper proposed the design and implementation of threat data collection subsystem, alert correlation subsystem and attack data extraction subsystem.
随后对攻击数据采集子系统,告警关联分析子系统和攻击数据生成子系统进行了详细设计和实现。
This paper, based on Ether network environment, primarily presents design and realization of data packet seize which is one of the measure against the hacker's attack.
主要介绍了基于以太网环境下数据包的截获的设计与实现。数据包截获的实现是防范网络黑客攻击的措施之一。
The extended linearization of nonlinear systems is used to design flight control systems at high angle of attack.
利用非线性系统的扩展线性化方法设计具有大迎角的非线性飞行控制系统。
Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.
接着,为了防止恶意代码发现和攻击,本文利用硬件虚拟技术为LAHF设计了自隐藏模块。
This paper puts forward a design method of IDL for coordinated attack. The IDL's mode, period, content, and order of communication are discussed in this paper.
提出了一种协同攻击机间互联数据链(IDL)的设计方法,对机间数据链的传输方式、传输周期、传输内容、传输时序等进行了研究。
The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.
第三部分,应用推广的构造攻击方法指导密码协议的设计。
And experiments demonstrated that the system could respond to attack events immediately and reasonably, reduce the risk of intrusion, so it has achieved the goal of our design.
实验证明,该模块能够及时、合理地对攻击行为进行响应,减小了入侵的风险,达到了设计的目标。
As seen above the design Angle of attack for the second segment is10deg.
如上所述,设计攻角的第二部分是10甘醇。
As seen above, the design Angle of attack for the second segment is10 deg.
如上所述,设计攻角的第二部分是10甘醇。
This kinetic model can be used in ballistic calculation of projectile with large angle of attack and also in the design of some smart munitions(e. g. target sensitivity projectile).
此动力学模型可用于弹丸大攻角飞行时的弹道计算及某些灵巧弹药(如末敏弹)的设计。
The robust adaptive flight control system design with neural network of attack helicopter is studied in this dissertation and super maneuver nimble of attack helicopter is realized.
本文就武装直升机大机动、高敏捷性神经网络鲁棒自适应飞行控制系统的设计问题展开研究。
The robust adaptive flight control system design with neural network of attack helicopter is studied in this dissertation and super maneuver nimble of attack helicopter is realized.
本文就武装直升机大机动、高敏捷性神经网络鲁棒自适应飞行控制系统的设计问题展开研究。
应用推荐