• In the case of operating system, many threats and attacks are covert, and covert channel is one of them.

    操作系统来说许多威胁攻击隐藏的,隐蔽通道就是其中一种

    youdao

  • An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.

    作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁攻击

    youdao

  • The journalists say they want a new law which will make threats and attacks on journalists an offense for which bail cannot be sought.

    记者他们要求出台新的法律针对威胁攻击记者的行为进行严惩,不得保释

    youdao

  • The network's new emerging threats and attacks, so look for a reliable and secure encryption algorithms imminent... RSA is the current mainstream public key encryption algorithm.

    网络新的威胁攻击不断出现寻找一个可靠安全加密算法迫在眉睫RSA就是目前主流公钥加密算法

    youdao

  • With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。

    youdao

  • With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。

    youdao

  • Worse than this, many such systems are not optimized and are vulnerable to the threats of partial or complete failure and external attacks.

    糟糕是,这样系统很多没有经过优化,容易受到部分全面故障外部攻击的威胁

    youdao

  • After coming to TSA with 26 years of law enforcement experience at the FBI, I understand the serious threats our nation faces and the security measures we must implement to thwart potential attacks.

    联邦调查局工作了26着这26年执法经验来到运输安全管理局,我了解我们国家面对严重威胁,深知我们采取安全措施阻止潜在袭击的必要性。

    youdao

  • As well as cold and exhaustion, polar explorers face more immediate threats – including polar bear attacks.

    除了寒冷疲惫极地探险面对各种直接威胁,比如北极熊攻击。 动物很少见到,但有高度危险性。

    youdao

  • In the first part, Schneier establishes a context for the topic of digital security by discussing threats, types of attacks, adversaries (i.e., "bad guys"), and the needs for true security.

    一部分中,Schneier通过讨论所面对威胁攻击类型对手(比如,恶意破坏者)安全需要数字安全这个主题建立了一个上下文

    youdao

  • Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.

    针对各种各样攻击实施威胁保护必须的,比如拒绝服务攻击(DoS)XML威胁。

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • In his article he delves into the details of how potential attackers use to prepare their attacks and how some common web service practices' support 'these threats.

    文章中详细探讨潜在黑客常用攻击技巧,以及一些常见Web服务应用又是如何支持”了这些攻击。

    youdao

  • Maseko said Cabinet had re-established the inter-ministerial committee (IMC), which is focuses on and deals with incidents and threats of xenophobia attacks on foreign nationals.

    马瑟科表示内阁已经重新组建了部际委员会(IMC),委员会将专注于预防处理外国人遭到排外袭击事件

    youdao

  • The non-traditional security threats,as demonstrated by the terrorist attacks and the anthrax incidents, have highlighted the importance and urgency of preventing such proliferation.

    9·11事件?炭疽风波代表非传统安全挑战再次凸显防止大规模杀伤性武器重要性紧迫性

    youdao

  • These defenses were designed against large scale threats, such as capital ship attacks, and were too ponderous to track fast-moving vessels such as Alliance starfighters.

    这些防御武器设计用来对抗大型目标的威胁主力舰的攻击,但它们过于笨重,无法咬住同盟星际战斗机那样快速移动的飞船。

    youdao

  • First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.

    首先介绍RFID系统组成、工作原理阐述了RFID系统中针对电子标签信息安全性隐私性威胁

    youdao

  • Security companies like ours uncover horrifying new threats and devastating new attacks, every day.

    保安公司我们揭露骇人听闻新的威胁破坏性的新的袭击一天

    youdao

  • The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    youdao

  • Here at home, we'll keep strengthening our defenses, and combat new threats like cyber attacks.

    国内我们加强我们防御,迎战网络攻击威胁

    youdao

  • Targeted attacks and Advanced Persistent Threats cannot be stopped by antivirus alone.

    单凭防毒软件无法阻止目标性攻击高级持续性威胁

    youdao

  • Here at home, we'll keep strengthening our defenses, 13 and combat new threats like cyber attacks.

    国内我们加强我们防御迉战网络攻击威胁

    youdao

  • My most solemn duty is to protect this nation and its people against further attacks and emerging threats. Some have unwisely chosen to test America's resolve, and have found it firm.

    庄严职责保护国家她的人民不再受到任何袭击威胁有些明智选择了试探美国决心发现了我们坚定的意志。

    youdao

  • My most solemn duty is to protect this nation and its people against further attacks and emerging threats. Some have unwisely chosen to test America's resolve, and have found it firm.

    庄严职责保护国家她的人民不再受到任何袭击威胁有些明智选择了试探美国决心发现了我们坚定的意志。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定