We employ enterprise-level DDOS attack protection service.
我们采用企业级的DDOS攻击的保护服务。
These packs allow users to tailor the attack protection to specific types.
这些包允许用户对攻击保护进行类型定制。
Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.
安全性:从硬件级别上实现故障和安全性的隔离,平台内置arp攻击防护能力,分布式和规模化提升防ddos攻击能力。
I mean, you might think it was for protection or something, but there has been no evidence found yet of any violent attack that would indicate that kind of danger.
我的意思是,你可能会认为这是为了保护或其他什么,但目前还没有发现任何暴力袭击的证据表明这种危险。
But they may also be used in a predatory way by women who are using the protection of anonymity to attack men who may have done nothing more than fail to notice them.
但是他们也可以被用作攻击性的途径,妇女可能在匿名的保护下,攻击除了没有关注她们,并无任何错误的男性。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.
自动下线是保护到给定系统(通常但并不必须是远程的)的休眠会话不被恶意利用,帮助降低受到恶意攻击的风险。
"It was a targeted attack," said Kellermann, who serves on the International Cyber Security Protection Alliance.
工作并在世界银行库房中负责网络情报安全。 先正在国际网络安全保护联盟工作的凯勒曼说,“这是有目地性的攻击”。
According to Rafael, an Israeli defence contractor, a ship's protection gear often costs as much as its attack weaponry.
根据拉斐尔(一家以色列防御承包商)的分析,一艘军舰的防御武器设备的费用几乎与它装备的进攻性武器费用相当。
The need for stability and protection. From earliest times, communities have had to keep peace among their members, defend themselves against extra attack, and protect community assets.
稳定和保护的需要始自最久远的时期,人类团体不得不在其成员间保持和平,在外来进攻中进行自卫,并且保护团体的财产。
If you are using XML Threat protection, make sure it does not block your test (because of suspecting XML-DOS Attack).
如果使用的是XMLThreatprotection,确保它不会妨碍您的测试(出现可疑的XML - DOS攻击)。
However police have told reporters that there is no evidence to suggest that cow protection groups were involved in the attack.
不过警察告诉记者,目前尚无证据显示圣牛保护组织与本次袭击有关。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
Conclusion: the angina attack before infarction can produce the ischemic preconditioning on myocardium that provides myocardium with definite protection.
结论:梗塞前心绞痛发作对心肌产生的缺血预适应有明确的心肌保护作用。
Aiming at the status that it is easier for secure chip to be attacked by error inject attack, this paper proposes a protection scheme of error inject attack for secure chip.
针对安全芯片容易遭受错误诱导攻击的情况,提出一种安全芯片错误诱导攻击防护方案。
Astaxanthin may play a key role in the protection of cell membranes against free radical attack, as well as support of the immune system and cardiovascular health.
虾青素可能在细胞膜免受自由基攻击保护的关键作用,以及作为免疫系统和心血管健康的支持。
The spur-dike is a common important building which is usually used in river course improvement projects, controlling river trend, bend protection, beam attack sand and high water levels.
丁坝是河道及航道整治工程中一种常用的重要建筑物,具有控制河势、保护岸滩、束水攻沙及壅高水位等多种功能。
The "Protection" covers static and dynamic malware detection, including real-world 0-day attack testing.
“防护”包括静态与动态恶意软件检测,涵盖了零日漏洞攻击等测试。
The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.
网络的攻击与防护是一对矛盾,严格地说,没有绝对的网络安全。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
Traditional security technique base on protection basically, but protection technique can only stop attack attempt to the best of its ability and leave this process.
传统的安全技术都基本上立足于防护,但是防护技术只能做到尽量阻止攻击企图的得逞和延缓这个过程,而不能阻止各种入侵行为的发生。
Microsoft Corp. is set to launch a blistering attack on rival Google Inc. on Tuesday for what the software giant argues is the Web search leader's "cavalier" approach to copyright protection.
全球软件业巨擘微软周二表示,猛烈抨击对手搜索引擎巨擘谷歌无视版权保护“豪取强夺”的做法。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
Penetration of fluorine polymer can be used to improve the mechanical strength, stop or slowdown the attack of water to ancient relics for protection of ancient brick-based buildings.
用含氟聚合物渗透加固保护古代砖质类建筑,提高文物的机械强度、抑制或减缓水对文物的侵蚀。
Multiple claims of the rightful ownership for a digital product, also called the IBM attack, are the threshold for the watermarking usage in the copyright protection.
数字水印版权维护中的多所有权声名题目,也鸣ibm攻击,是数字水印版权维护的瓶颈。
A helpless withdrawal is a starting point of wandering and the defence signifies the protection of the homeland of the soul in face of the attack of the strong enemy.
一场悲壮无奈的撤离成为流浪的又一起点,而守望则是面对强敌进逼而对精神家园的最后看护。
A helpless withdrawal is a starting point of wandering and the defence signifies the protection of the homeland of the soul in face of the attack of the strong enemy.
一场悲壮无奈的撤离成为流浪的又一起点,而守望则是面对强敌进逼而对精神家园的最后看护。
应用推荐