• Common web attacks protection - detecting common web application security attacks.

    常见Web攻击防护——对常见的Web应用安全攻击进行检测

    youdao

  • However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.

    然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标

    youdao

  • Describes common types of Web-site security attacks and how to help prevent them.

    描述常见网站安全攻击类型以及如何帮助阻止这些攻击。

    youdao

  • Describes common types of Web site security attacks and how to help prevent them.

    说明常见网站安全性攻击类型利于避免受到攻击的方法。

    youdao

  • This article outlined the key players and security attacks and defenses in an e-Commerce system.

    本文概述e - Commerce系统中的关键参与者安全性攻击防御

    youdao

  • Partly because they're the target of often more advanced security attacks, they're the sharp end of the stick.

    部分原因是由于他们容易成为高级安全性攻击靶子所谓枪打出头鸟。

    youdao

  • Resources access control (AC) is an essential defensive measure against a large number of security attacks.

    对于分布式应用资源大量安全攻击来说,访问控制重要防范手段

    youdao

  • That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.

    当初之所以.NET中引入这个特性为了阻止网络上进行的安全攻击

    youdao

  • An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.

    外部黑客也许安全性攻击方面的专家但是他们可能没有攻击动机

    youdao

  • By totally disallowing any direct access to memory, an entire huge, messy class of security attacks is ruled out.

    禁止程序直接访问内存,那么整整一大类安全攻击彻底清除了

    youdao

  • An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.

    外部黑客也许安全性攻击方面的专家但是他们可能没有攻击动机

    youdao

  • Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.

    安全机制通过增加MAC认证保密防御MAC的安全攻击

    youdao

  • The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    youdao

  • However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.

    然而没有签名清单的情况下,很难确保应用程序安装程序受到中间人安全攻击时被篡改

    youdao

  • At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.

    首先智能卡安全攻击主要方法进行了研究,分析了几种最新的智能卡攻击技术原理关键步骤

    youdao

  • Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.

    如果运行最新插件计算机容易安全攻击因为插件没有最新安全补丁。

    youdao

  • This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.

    本文讨论嵌入式系统安全设计面临挑战以及受到攻击方式,探讨了如何弥合安全处理的资源缺陷抵抗攻击的方法。

    youdao

  • Although compared with the previous, improved their safety, but when faced with security attacks (passive attacks and active attacks), the whole network system security still needs to be improved.

    虽然之前相比安全性有所提高面临安全攻击(被动攻击主动攻击)时,整个网络系统安全性仍然亟待提高。

    youdao

  • The INS should pay more attention to serving the millions of ordinary Americans who rely on the nation's border security to protect them from terrorist attacks.

    移民归化局应该关注服务依赖国家边境安全保护自己免受恐怖袭击数百万普通美国人。

    youdao

  • Wireless security providers will often take steps to help combat the threat of jamming attacks.

    无线安全供应商通常采取措施减轻干扰攻击威胁

    youdao

  • Western security sources worry they could stage attacks outside the country, of the kind that destroyed the American embassies in Kenya and Tanzania in 1998.

    西方安全部门担心他们在境外发动袭击,类似于1998年摧毁肯尼亚坦桑尼亚美国大使馆那种情况。

    youdao

  • One is security: such systems will be vulnerable to all sorts of hacker attacks.

    有一个安全此类系统各式各样黑客攻击。

    youdao

  • This security restriction is to avoid cross-site scripting attacks (XSS).

    这个安全限制为了避免跨站点脚本攻击(XSS)。

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • If companies are on top of knowing their security weaknesses and communicate with the security community, APT attacks can be withstood and ultimately turned against the criminals perpetrating them.

    如果企业知道他们自己安全漏洞安全社区交流,那么它们抵挡住apt攻击,并最终击败黑客的网络犯罪活动。

    youdao

  • Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    测试额外安全性可攻击性问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    youdao

  • Since then it has launched numerous small-scale attacks against Yemeni security forces and has struck in Saudi Arabia too.

    那时起,他们向也门安全力量发起了无数次小型袭击,他们袭击过沙特阿拉伯。

    youdao

  • Bashary says this was no surprise and security measures are in place to try to prevent such attacks.

    沙里,这次袭击预料之中,我们预防这样的袭击已经采取了安全措施

    youdao

  • Bashary says this was no surprise and security measures are in place to try to prevent such attacks.

    沙里,这次袭击预料之中,我们预防这样的袭击已经采取了安全措施

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定