• 设计实现PF_KEY第二协议协议主要负责提供IKE内核安全数据库进行通信接口

    The author designs and realizes the second edition of PFKEY protocol, which is mainly responsible for providing the interface for communication between IKE and Kernal secure database.

    youdao

  • 最后基础上完成一个基于内核入侵木马设计实现

    Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.

    youdao

  • 重点设计实现PF_KEYV2协议协议主要负责提供IKE内核安全数据库进行通信接口

    The paper prominently designed and implemented the PF_KEY V2 protocol, which mainly provides the communication interface between IKE and SADB.

    youdao

  • 构件操作系统设计关键技术集中反映内核设计实现

    For component based operating system, the key constructing techniques constrictively express themselves on the design and implementation of the kernel.

    youdao

  • 涉及高级主题内存测试验证设备驱动程序设计实现实时操作系统内核以及代码优化技术

    Among the advanced topics covered in the book are memory testing and verification, device driver design and implementation, real-time operating system internals, and code optimization techniques.

    youdao

  • 解决数据请求占用内核时间问题SD驱动软件设计与实现

    The SD card driver design resolves that the kernel is occupied too long by data request;

    youdao

  • 解决数据请求占用内核时间问题SD驱动软件设计与实现

    The SD card driver design resolves that the kernel is occupied too long by data request;

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定