On how to attack aircraft carrier battle groups on the more attention.
对于如何打击航母作战群就更加关注了。
This is just one of those games when we didn't realize how to attack the Hawks.
这就是我们在和老鹰对抗中没有意识到如何攻击的关键。
He knows how to defend, how to attack and can play either centre-half or left-back.
他知道如何防守,如何进攻,可以担任中后卫和左后卫。
Remember, a qualified commander should not only know how to defend, but also how to attack!
请记住,一个合格的指挥官不仅要知道如何保护,却怎么也攻击!
I have been researching into actual examples of how to attack the Validate Request protection.
我一直在研究如何攻击实例验证请求保护。
A student who learns to handle Numbers mentally can focus on how to attack a problem and then complete the actual calculations easily.
学会心算的学生能把注意力集中到如何解题上,然后轻而易举地完成实际运算。
Did you encounter any situations last year that could have been prevented or less painful if you had a better handle on how to attack the problem?
您去年是否遇到过任何这样的情形:如果更好地了解如何攻克问题的话,原本可以防止问题或者使问题不那么棘手?
And I sort of gave him hints about how to attack Irving Singer and his writing and he took me up on that and then what I published was a much less favorable paper.
我给了他很多暗示,怎样抨击欧文·辛格和他的作品,他接受了我的意见,之后发表的那篇论文中不太有利于我。
I need advice how to attack this problem the expected results is to have a list with 10-20 groups of very similar names, and may be further adjust the sensitivity for more results.
我需要建议如何攻击这个问题的预期结果是列表10- 20组非常相似的名字,并可能进一步调整灵敏度结果。
But then at least see calculus as one of the tools essential for mastering your subject and see it as the theory which teaches you how to attack and solve problems in a systematic way.
但至少把微积分看作是掌握学科的重要工具,而且是教你学习如何有系统地进攻与解决问题的重要理论。
No amount of improvement in computer hardware will ever make such a problem tractable. The only hope is an enormous, and unlikely, conceptual breakthrough in how to attack the question.
计算机硬件方面再多的改进也不足以解决这个问题,只能寄希望于庞大的,不大可能的关于如何解决问题的概念性突破。
Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
多重线性密码分析是线性密码分析方法的一种推广,如何利用多重线性密码分析方法来攻击DES一直是人们关注的焦点。
But they are nationalists whose instinct in the face of external attack will surely be to rally around their leaders, no matter how flawed.
但是他们是民族主义者,面对外来的进攻,他们会本能地聚集在他们领导者的周围,不管这个领导有多少缺点。
And one of the most common ways to attack programs is to exploit how they make requests to other programs.
攻击程序使用的最常见方式之一就是利用这些程序向其他程序发出请求的方式。
This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.
本部分讨论了您如何机智地减少成功攻击的机率,以及当您面对成功攻击时如何作出反应。
During the demonstration, Mr Kamkar showed how straightforward it was to use the attack to identify someone's location to within a few metres.
卡门卡先生展示了用此攻击识别特定人的地理位置究竟有多么简单,精度在几米之内。
They all seem to be used only in targeted attacks and therefore the number of affected customers is very low. Here’s a diagram that demonstrates how such an attack happens
现在微软已经发现一些不同的攻击文件被使用,但是他们仅被使用在特定目标的攻击,所以受影响的客户数量不大。
Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。
Scientists are trying to identify these cardiac stem cells, and then figure out how to juice them up so they can repair damage caused by a heart attack.
科学家正试图分离出这些心脏干细胞,然后找到激活它们的方法,这样它们就可以修复由于疾病带来的心脏损伤了。
Rather, it's about having a general plan of attack and knowing how or where to go to get help, which is always a guaranteed step toward a solution.
相反,它意味着拥有一个总体规划并知道如何或到何处获取帮助,这始终是问题得到解决的保证步骤。
Even though the threat seems to have passed, questions remain about just how serious this attack was and if there will be any repercussions for the worm's creator.
尽管这次威胁看来已经过去,但人们仍然对这次攻击的严重性留有疑问,或对这次蠕虫制造者将受到的惩罚表示好奇。
Because it is difficult to trace hackers, exactly who isbehind any specific attack and how and where they operate remains to alarge extent a mystery, technology experts say.
技术专家说,因为黑客很难追踪,所以谁是攻击的幕后黑手很难确定,他们在哪里以及如何发动的攻击在很大程度上也都是谜。
After the attack we had no way to know how much of the proscribed material had been destroyed, but Iraq's ability to produce and deploy dangerous weapons had plainly been reduced.
袭击之后,我们无法知道有多少违禁原料被销毁,但毫无疑问,伊拉克生产和部署危险武器的能力被大大削弱了。
Steven Fogarty, who suffered 40 puncture wounds to his leg, told how he survived the attack by punching the bull shark in the face. "Something just grabbed me from behind.
这名叫史蒂芬·福格蒂的受害者腿部有40处伤口,他告诉人们他是怎样拼命击打鲨鱼的脸才得以逃生的,他说,“有时候它只是从后面咬住我。
Later I was to learn how it feels to be slammed on the head from behind by a large male chimpanzee, but fortunately for me he did not continue his attack.
不久之后我得知被一只雄性大猩猩从后边击中头部是什么感觉,然而幸运地是他没有发动对我的攻击。
In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.
在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。
Americans might well see this as an attack on their historical right to own a home no matter how precarious their finances.
美国人很可能会将此看做是对于他们拥有自己的住房的历史权利(不论其财务状况多么糟糕)的侵犯。
A novice skydiver yesterday described how he survived a plunge of thousands of feet after the instructor he was strapped to suffered a fatal heart attack in mid-air.
一位跳伞新手昨天描述了惊心动魄的一幕:和他系在一起的跳伞教练在半空中突发心脏病身亡,他凭借一己之力从千米高空成功降落。
A novice skydiver yesterday described how he survived a plunge of thousands of feet after the instructor he was strapped to suffered a fatal heart attack in mid-air.
一位跳伞新手昨天描述了惊心动魄的一幕:和他系在一起的跳伞教练在半空中突发心脏病身亡,他凭借一己之力从千米高空成功降落。
应用推荐