Vershbow called this aggressive policy deployment of defensive assets to the region.
弗什鲍称这是在该地区部署防御性资产的激进政策。
Find out what happens when you combine defensive programming, design by contract, and an easy-to-use generic validation framework called OVal.
尝试为应用程序整合进防御性编程、契约式设计和一种叫做OVal的易用的通用验证框架。
Security analysts are often called white hats, and white-hat analysis is the use of hacking for defensive purposes.
安全分析师通常称为 白帽(white hat), 白帽分析是为防御目的而使用的密码破解。
It's the same computation. But this is a nice way of writing it, often called defensive programming.
这跟原来的计算过程没什么不同,但这是写代码的更优秀的一种方式。
应用推荐