• ESET病毒实验室云端得到实时威胁相关信息保持信誉服务能够维持最新对抗互联网威胁防护

    Based on real-time streaming of threat-related information from the cloud, the ESET Virus lab keeps the reputation services up-to-date for a constant level of protection against Internet threats.

    youdao

  • 化学威胁需要不同防护手段因为化学品蒸气的形式存在,微粒过滤器对它们无效。

    A chemical threat needs a different approach, because chemicals come as mists or vapors that are largely immune to particulate filtration.

    youdao

  • 设备的IPS可防护超过3000种已知威胁包含有协议异常分析

    The Fortinet UTM's IPS protects against more than 3,000 known threats and includes protocol anomaly analysis.

    youdao

  • 因为他们曼哈顿地区一道为防止水面上升威胁人们安全防护后面

    They crave a view of nature because the Manhattan they live in sits partly behind a wall, a barricade built to block rising waters.

    youdao

  • 盒子防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    youdao

  • 普金认为这样可以更好地防护伊朗导弹威胁并且俄罗斯不会曾经威胁地那样将核弹头瞄准欧洲

    Mr Putin said this would offer better protection from Iranian missiles, and that Russia would no longer have to aim its warheads at Europe, as he had threatened.

    youdao

  • 感觉到意思真正个人防护提交国家”特征—最快也许响应病毒威胁

    Feel the meaning of Real Personal Protection with the "Submit State" feature-the fastest possible responder to virus threats.

    youdao

  • 加强网络安全稳定运行,特将当前互联网的主要安全威胁防护策略加以分析

    To enhance the sa fe and stable operation of the network, th is paper describes thema jor security threats and protection strategy of Interne.

    youdao

  • 分析无线网络所面临各种安全威胁基础讨论构建无线网络安全防护体系原则方法

    Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.

    youdao

  • 为了减少敌方武器威胁,根据敌方武器的构造工作原理,利用其弱点,采取综合防护战、多层截击战摧毁破袭战等多种防范方法

    In order to reduce the threat of foetal weapon, by use of foetal weapons failing, we can adopt many methods such as synthetic defense, multi-layer volley, destroy and smash weapon, and so on.

    youdao

  • 长输管道腐蚀问题日趋严重,防护存在破损剥离等缺陷对管道安全运行构成极大威胁

    The deterioration of corrosion of long-distance pipeline, the damages and spalling of protecting layer have imposed great threats to the reliable operation of pipeline.

    youdao

  • 对于当前混合型攻击层出不穷安全威胁传统基于单一设备网络安全防护技术己显得无能为力了

    For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.

    youdao

  • 保证已经通过一系列关键测试确保客户最新病毒威胁最佳防护

    This is to ensure that the key has been through a series of tests to ensure our customers the latest virus threats from the best protection.

    youdao

  • 文中主要总结激光人眼光电传感器威胁详细综述了激光防护原理激光防护材料研究现状,提出了激光防护材料的发展趋势

    The threat of laser on eyes of people and sensor are summarized. Protective principles and study actuality are reviewed, and the developing trends of laser protective materials are briefly commented.

    youdao

  • 然而,在它们防护以外的地方,这些可以去掉狗链自由的遛而且通常攻击没有威胁陌生人

    However, outside the protected area the dogs can be walked off leash and are usually not aggressive with non-threatening strangers.

    youdao

  • 遇到特殊情况患者发病时,常常来不及使用专门防护管理人员健康造成了一定威胁

    Encountered special circumstances, such as patients, he is often too late to use special protective clothing, which the management of the health threat caused some.

    youdao

  • 为了防御这些与众不同的威胁需要端点采用分层防护智能防护技术。

    These distinct threats require layered protection and intelligent security at the endpoint.

    youdao

  • 而如果医院没有一个健全的患者-处理系统确保患者进行消除污染处理,或者没有防护医护人员直接暴露毒性物质威胁之下。

    If the hospital does not have a patient-management system that ensures decontamination or protective gear for doctors to wear, they can be exposed to toxic substances.

    youdao

  • 木马利用HTTP隧道技术打破网络安全防护设备网络安全造成严重白勺威胁

    Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.

    youdao

  • 木马利用HTTP隧道技术打破网络安全防护设备网络安全造成严重白勺威胁

    Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定