This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
And both pose a particularly difficult strategic quandary: a hallmark of cyber and bio attacks is their ability to defy deterrence and elude defenses.
这也构成了一个难以解决的战略窘境:网络和生物袭击的特征就是,他们所具备的无视和躲避防御系统的能力。
These defenses were designed against large scale threats, such as capital ship attacks, and were too ponderous to track fast-moving vessels such as Alliance starfighters.
这些防御武器被设计用来对抗大型目标的威胁,如主力舰的攻击,但它们过于笨重,无法咬住像同盟星际战斗机那样快速移动的飞船。
And building the plane, with its top-secret communications and defenses against attacks, runs in the billions of dollars.
制造这种配有绝密通信设备和预防攻击设施的飞机,要耗费数十亿美元。
Here at home, we'll keep strengthening our defenses, and combat new threats like cyber attacks.
在国内,我们将加强我们的防御,迎战网络攻击等新威胁。
The monsters took advantage of weakened defenses and mounted attacks on both capital towns.
的怪物趁机削弱防御系统,并展开攻击资本城镇。
Here at home, we'll keep strengthening our defenses, 13 and combat new threats like cyber attacks.
在国内,我们将加强我们的防御,迉战网络攻击等新威胁。
Because of increased patrols and defenses on board ships, the success rate has gone down, though the number of successful attacks has stayed the same year over year.
因为增加了巡逻和增强了各类船只的防卫力量的缘故,虽然年复一年,海盗们得手的次数仍保持不变,但是海盗们抢劫的成功率已降低了。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
应用推荐