Attackers can use such attempts to launch DoS attacks against a user.
攻击者可以利用这样的方法来发动针对某个用户的DoS攻击。
While very important, DoS attacks are beyond the scope of this article.
尽管它很重要,但是DoS攻击超出了本文的范围。
The fourth chapter describes the massive data storage and access features and DOS attacks.
第四章介绍了海量数据的存储与访问和DOS攻击的特征。
Preventing DoS attacks require different techniques that go well beyond what an application server can provide.
防范DoS攻击需要不同的技术,这超出了应用服务器所能提供的范围。
Preventing DoS attacks requires very different techniques that go well beyond what an application server can provide.
防范DoS攻击需要很不一样的技术,这超出了应用服务器所能提供的范围。
As well as guarding against DoS attacks, you also ensure that you are not surprised by an unexpected usage bill from the cloud provider.
除了防止DoS攻击之外,您还需要确保云提供商寄来的账单基本符合预期。
DOS attacks may be intentional - like when someone deliberately jams the frequency - or unintentionally generated when someone heats up soup in the office microwave.
DOS攻击也许是有意的比如当某人故意堵塞某个频率时或者是无意造成的,就象某人在办公室的微波炉里加热汤。
Designing network system from the survivability could manage the DoS attacks positively, and provide essential services as long as possible in the presence of attacks and failures.
从生存性角度来设计网络系统可使网络系统在受到攻击时,能积极地应对攻击,尽可能长时间地提供关键服务。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denialof Service,DoS)攻击。
However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.
尽管如此,通过访问解析器来读取一个单独的文档,就可以进行拒绝服务(DoS)攻击,无需任何其他连接。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denialof Service,DoS)攻击。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
They prevent Denial of Service (DOS) attacks that are either malicious or unintentional.
它们可防止恶意或无意的拒绝服务 (DOS)攻击。
This bound on message size is intended to limit exposure to DOS-style attacks.
对消息大小进行的此限制旨在降低遭受拒绝服务(DoS)攻击的可能性。
The constraints protect against a class of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.
这些约束可以抵御某种类型的拒绝服务(DOS)攻击,这些攻击试图利用消息复杂性来占用终结点处理资源。
The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.
这些约束可以抵御某种类型的拒绝服务 (DOS)攻击,这些攻击试图利用消息复杂性来占用终结点处理资源。
The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.
这些约束可以抵御某种类型的拒绝服务 (DOS)攻击,这些攻击试图利用消息复杂性来占用终结点处理资源。
应用推荐