• Attackers can use such attempts to launch DoS attacks against a user.

    攻击可以利用这样的方法来发动针对某个用户的DoS攻击

    youdao

  • The fourth chapter describes the massive data storage and access features and DOS attacks.

    第四章介绍海量数据存储访问DOS攻击的特征

    youdao

  • Preventing DoS attacks require different techniques that go well beyond what an application server can provide.

    防范DoS攻击需要不同技术超出应用服务器提供的范围。

    youdao

  • Preventing DoS attacks requires very different techniques that go well beyond what an application server can provide.

    防范DoS攻击需要不一样技术超出应用服务器提供的范围。

    youdao

  • As well as guarding against DoS attacks, you also ensure that you are not surprised by an unexpected usage bill from the cloud provider.

    除了防止DoS攻击之外,需要确保提供商寄来账单基本符合预期

    youdao

  • DOS attacks may be intentional - like when someone deliberately jams the frequency - or unintentionally generated when someone heats up soup in the office microwave.

    DOS攻击也许有意比如某人故意堵塞某个频率或者是无意造成的,象某人办公室的微波炉里加热汤

    youdao

  • Designing network system from the survivability could manage the DoS attacks positively, and provide essential services as long as possible in the presence of attacks and failures.

    生存性角度来设计网络系统可使网络系统受到攻击时,能积极地应对攻击,尽可能长时间提供关键服务

    youdao

  • Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denialof Service,DoS)攻击

    youdao

  • However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.

    尽管如此通过访问解析器读取一个单独文档,就可以进行拒绝服务(DoS)攻击无需任何其他连接

    youdao

  • Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    注意,这里没有考虑一种技术攻击形式拒绝服务(Denialof Service,DoS)攻击。

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.

    针对各种各样攻击实施威胁保护必须的,比如拒绝服务攻击(DoS)XML威胁。

    youdao

  • The constraints protect against a class of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.

    这些约束可以抵御某种类型拒绝服务(DOS)攻击,这些攻击试图利用消息复杂性占用终结点处理资源

    youdao

  • The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.

    这些约束可以抵御某种类型拒绝服务DOS攻击,这些攻击试图利用消息复杂性占用终结点处理资源。

    youdao

  • The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.

    这些约束可以抵御某种类型拒绝服务DOS攻击,这些攻击试图利用消息复杂性占用终结点处理资源。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定