• Intrusion detection as a proactive security protection technology has become a part of the future network security study.

    入侵检测技术作为一种主动安全防护技术成为未来网络安全研究中不可缺少的一部分

    youdao

  • From the perspective of systems engineering, Fault Tree analysis method which is widely used in system security study is used for analysis of urban rail transit accident.

    系统工程学角度出发,将广泛应用于系统安全研究中的事故分析方法应用到城市轨道交通事故分析

    youdao

  • Under such background, "Social security Study" has become a compulsory or a professional course of colleges in many countries, Specially for the student of the human resources management.

    这样背景下,《社会保障这门课程成了各国高等院校特别是人力资源管理专业学生必修的基础课专业理论课。

    youdao

  • The themes refer to international cooperation and international conflict. The studies of international relations include international security study and international political economy.

    国际关系分析方法分为层次 ,即个人层次、国家层次体系层次 ;

    youdao

  • Dr. Liu Changping, a full-time researcher of the Center for Social Security Study of Wuhan University, director of Hubei Association of Public Administration Studies, was born in Wuhan in 1972.

    刘昌平,男,1972年,湖北武汉人,管理学博士,武汉大学社会保障研究中心专职研究人员湖北省公共管理研究会理事

    youdao

  • Thus at the automobile passive security study, especially in the research of improving the automobile front part shape to reduce pedestrian injury, a model tool which can be trust is established.

    从而汽车被动安全研究尤其是改进汽车前部形状减少行人伤害研究建立了一种可以信赖工具

    youdao

  • A recent study shows many broadband services lack basic security features.

    最近研究表明许多宽带服务缺少基本安全特性

    《柯林斯英汉双解大词典》

  • The last case study looks at the security situation in Haiti both before and after last year's devastating earthquake.

    最后一个研究案例是海发生去年毁灭性地震之前之后的的安全状况

    youdao

  • DARPA also wants to study programming models that allow developers to more easily design in security, dependability, power efficiency and high performance.

    DARPA研究项目模型允许开发者安全性可靠性功效性能方面轻松地设计

    youdao

  • Demand is strong for steel piping in the North American oil and gas industry, but regulators will study the deal to see if there are any implications for energy security.

    北美石油天然气行业钢管需求比较强劲,监管机构调查研究决定此项收购是否对能源安全产生影响

    youdao

  • On the ground, all big relief operations have communications centres where aid workers go to send e-mails, read the latest security updates and study satellite maps of the affected area.

    受灾现场所有大型救援行动都设有通讯中心援助人员可以那里发送电子邮件阅读最新安全资料,以及研读受灾地区卫星地图

    youdao

  • A case study of the Olympics security system and related products, boundary surveillance system, smart soldier system and more will highlight the public security sector.

    奥运会安保系统相关产品案例研究边境监视系统、智能士兵系统和更多内容公共安全板块亮相

    youdao

  • The study highlights the psychological importance of personal control of one's destiny in providing security.

    研究强调个人掌控自我命运时,心理作用重要性

    youdao

  • This section discusses the Domino server configuration used for our case study, including the Domino Server document and Configuration document settings that are most relevant to security.

    部分讨论用于这个案例研究Domino服务器配置包括安全性相关 DominoServer文档Configuration 文档设置

    youdao

  • A study which is to be unveiled on August 4th at Black hat, a security conference in Las Vegas, suggests that day is close.

    拉斯维加斯召开的信息安全大会——技术会议8月4日公布个新的研究结果,意味着一天不远了。

    youdao

  • A recent study suggests that So-Low sunglasses can actually increase the risk of damage to peoples eyes by creating a false sense of security.

    最近研究表明So -Low太阳镜由于造成一种虚假安全感实际增加人们眼睛受损伤危险

    youdao

  • But another study, by Panda Security, found that about a third of small and medium-sized businesses had been infected with malware originating from social networking sites like Facebook and Twitter.

    另外一熊猫安全(Panda Security)公司进行研究发现大概三分之一中型企业被来自于Facebook和Twitter一类社会化网络恶意软件所感染。

    youdao

  • Job security was overwhelmingly important to fathers, the study showed, with high earnings and advancement taking a back seat.

    研究表明工作稳定性父亲而言极其重要收入晋升相对而言则没那么重要。

    youdao

  • College educated women marry later, have fewer children, and are less likely to view marriage as "financial security," according to a 2010 Wharton study [PDF].

    根据沃顿商学院2010年的份研究报告,受过大学教育的女性结婚热衷生小孩,也很少婚姻当作财务保险”。

    youdao

  • "Security" management theory through the study of unsafe behavior, based on the establishment of a system of employee behavior, the mechanism of improving safety performance.

    行为安全管理理论通过对不安全行为研究建立基于员工行为的、系统的、改进安全绩效的机制

    youdao

  • This paper make some study to relevant key technology of honeypot, have a certain and positive effect on better arrangement online security defence system.

    本文对蜜罐中的相关关键技术了一些研究,对于更好布置网络安全防御体系起着一定积极作用

    youdao

  • Students can settle in to a false sense of security if they take the time to study but don't retain much of the information.

    对于学生如果他们时间学习没有学到多少知识,他们可能处于种不真实安全感

    youdao

  • System itself, but will not find loopholes in actual use by users, or by security personnel and hackers in the study found.

    系统本身并不发现漏洞而是用户实际使用安全人员黑客研究发现的。

    youdao

  • A recent study conducted by Sophos Security reported that 46% of Facebook users are willing to accept a friend request from someone whom they don't know at all.

    索弗斯(SophosSecurity)网络安全公司最近调查表明,46%Facebook用户愿意接受完全认识发出的好友请求

    youdao

  • As the importance of the XML in storing, carrying and exchanging data, it is very necessary and valuable to study the security of XML in the process of transferring data.

    由于XML存储携带交换数据方面重要性研究XML在数据传递过程中的安全性有必要价值的

    youdao

  • A study conducted by Internet security giant Kaspersky found that a quarter of people ranked their smartphone as equally important to them as their parents.

    网络安全巨头卡巴斯基研究发现,有四分之一手机视作与父母一样重要

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定