• At first, the paper fully expatiates the basic viewpoint of networks security, dynamic security model of P2DR, and the basic concept and classification of instruction detection.

    论文首先全面阐述网络安全基本观点P2DR动态安全模型入侵检测基本概念分类

    youdao

  • Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.

    无线异构网络中的关键安全技术包括安全路由协议接入认证技术入侵检测技术节点协作通信

    youdao

  • A universal security framework based on MABAN is designed according to an security standard of active networks security working group (ANSWG), which can protect the resource of an node effectively.

    设计了一个通用基于移动代理的主动网络安全框架符合主动网络安全工作组提出的主动网络安全规范有效地保护主动结点资源

    youdao

  • Security firm MacAfee recently found that eight out of 10 countries around the world had had critical networks targeted by hackers during 2010.

    安全公司麦咖啡最近发现在2010年世界上十个国家八个重要网络收到了黑客的攻击。

    youdao

  • They want a gateway device that can translate security tokens from whatever format the client wants to use into an LTPA token for consumption within their own networks.

    它们需要一种网关设备网关设备可以安全客户希望使用格式转换自已网络中使用的ltpa

    youdao

  • Across the core defence networks there were an average of over a million security alerts every day.

    核心防御网络上出现安全警报次数,平均每天多达一百万次。

    youdao

  • Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.

    有些认为许多私有网络安全一些人则认为计算可能敞开更多安全漏洞。

    youdao

  • As more and more people started using their unique devices to access corporate networks, companies had to worry about security as well as support for multiple devices.

    随着越来越多的开始使用独特的设备访问企业网络公司不得不开始担心多种设备的支持以及安全问题来。

    youdao

  • The Center will be a testing ground for everything from intelligent traffic systems to next-generation wireless networks and smart-grid cyber security systems.

    中心城会成为各种新发明——智能交通系统新一无线网络技术以及智能电网网络安全系统——的试验基地

    youdao

  • Apple recommends splitting the bands into two separate networks, naming them differently and making sure that both networks use the same type of security (WEP, WPA, or WPA2).

    苹果公司建议频段信号分开成为两个命名不同网络并且确保使用相同安全设置(WEPWPAWPA2)。

    youdao

  • Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.

    虚拟之间通信所用内部虚拟网络控制不够明确,难以实施安全策略。

    youdao

  • Just as telephones used to be differentiated from PCs, servers, and networks, so did security and alarm systems used to be viewed as wholly separate from it.

    正如电话个人电脑服务器以及网络有所不同安全报警系统视为IT完全不同。

    youdao

  • While this bypasses the previous limitation, it introduces a security breach in case you want to build segregated networks.

    虽然这个方法不会出现前面的限制问题,但是如果希望创建分隔的网络,那么会造成一个安全漏洞

    youdao

  • The way that we assemble complicated networks of computers until recently hasn't been done at all with security in mind except in a cursory way, and that's the fundamental problem.

    直到最近我们安装电脑网络时,没有一点安全意识敷衍了事才是根本问题所在。

    youdao

  • Apparently some TV, radio links and even security networks are transmitting signals where they are not supposed to be, messing with the satellite's sensitive measurements.

    显然一些电视无线链路以及甚至一些加密网络在使用不该使用的信号频率进行传输这就扰乱卫星敏感探测器。

    youdao

  • And in India, there are worries that Huawei networks could pose security risks.

    印度也有许多人担心华为引起安全问题。

    youdao

  • The Army is undertaking the upgrades to ensure a seamless interface with existing networks and to provide extensive security and business continuity.

    美国陆军实施升级计划,现有网络无缝接口,提升保密性业务连续性。

    youdao

  • Further, mobile devices can now bypass the telephone company network and connect directly with corporate networks through Wi-Fi both for speed and security.

    还有移动设备现在可以越过电话公司网络直接通过Wi - Fi访问企业网络,这保证速度安全

    youdao

  • Despoof is another security tool you can use in detecting spoofed packets used to carry your Ajax applications across networks.

    Despoof另一种检测欺骗数据包的安全工具,这些欺骗数据包能够网络传送ajax应用程序

    youdao

  • This article helps you do some planning ahead to help improve the security of your Ajax applications, whether they're located on servers, client-side, or networks.

    本文帮助提前进行一些规划改善服务器客户端网络中的Ajax应用程序安全性

    youdao

  • Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.

    如果网络安全控制IaaS网络基础设施中无效,就会出现虚拟化网络中基于网络的控制不足

    youdao

  • My research areas include, but are not limited to, databases, data mining, security, social networks, Internet applications and some mathematics.

    应该会在2010年毕业。我的研究领域包括数据库数据挖掘安全社会网络互联网应用以及数学和其他

    youdao

  • Stuxnet has been spotted on computer networks for nearly two years, but the world's top computer security experts have yet to pinpoint exactly who created it, or why.

    Stuxnet电脑网络上仅仅年前发现但是世界顶尖的电脑安全专家依然无法准确地找出谁制造了这种病毒,也无法找出制造它的原因。

    youdao

  • For security, WLAN's wired equivalent Privacy (WEP) encryption mechanism provides a level of security equivalent to wired networks.

    出于安全性考虑,WLAN的WiredEquivalentPrivacy (WEP)加密机制提供与有线网络相同安全级别

    youdao

  • For security, WLAN's wired equivalent Privacy (WEP) encryption mechanism provides a level of security equivalent to wired networks.

    出于安全性考虑,WLAN的WiredEquivalentPrivacy (WEP)加密机制提供与有线网络相同安全级别

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定