英语人>网络例句>defensing 相关的网络例句
defensing相关的网络例句

查询词典 defensing

与 defensing 相关的网络例句 [注:此内容来源于网络,仅供参考]

But we must point out that Aron's stance of defensing ofdemocracy and fighting against totalitarianism is not based on logic necessity but on somesubject inclination or religion,and that his comparison of the two regimes is inevitably markedby personal prejudice.

在此,我们也必须指出,阿隆反对极权主义、维护自由民主的立场,同样也没有逻辑上必然性,而仅仅以一种主观倾向为基础,是建立在信仰基础上的,因而他对两种制度的比较不可避免地带有个人偏见。

This topic is focus on building a safe, reliable, and fairly active defense capabilities campus network security model, by the security assessment, vulnerability scanning and other technical means, to reinforce the existing shortcomings and vulnerabilities of information systems, and to establish a strong defensing ability information system platform; useing related network security precautions technologies, to establish campus network security and prevention system, to fundamentally eliminate security threats from internal and external network.

本课题致力于构建一个安全、可靠、具有一定主动防御能力的校园网安全模型,通过安全评估、漏洞扫描等技术手段,对现有信息系统的缺陷、漏洞进行加固,建立具有较强防范能力的信息系统平台;利用网络安全防范的相关技术,建立校园网安全防范体系,从根本上解决来自网络内外部对网络安全造成的各种威胁。

It provides the solution using two ADE7755 chips to realize defensing electric larceny for the single-phase watt-hour meter and other measures to defense electric larceny.

为实现单相电能表的防窃电功能,提出了用两块ADE7755 计量芯片的解决方案及其他防窃电措施。

The amount of passes of the top 8 teams is 443 times, much more than the last world cup game; the everage number of passes of each team in one game in the group stage is more than the number in the knock-out stage. The most efficient of passes took place in the midfield, then the defensing third and the attacking third the last.

本文综合采用了文献资料法、专家访谈法、逻辑分析法、观察统计法、数理统计法和比较分析法对参加第18届世界杯足球赛的八强球队在比赛中的传球情况进行统计分析后,从宏观上对这些球队在传球这一数据上所体现的基本特征及影响要素进行分析研究,从研究中得出以下结论: 1。

My dissertation points out that despite the politicalprejudice,Aron,by fighting against Left intellectuals' political fanaticism and defensing thepolitical reason,can help us understand true Marxism.

本文指出,尽管存在政治偏见,但是阿隆反对左派知识分子政治狂热,从而维护了政治理性,客观上有助于对马克思主义的正确理解。

This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilter's frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the user's interface ; the last part is the applicating guide of its exploiting process.

本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。

This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.

本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了7个部分:第1部分对防火墙的概述;第2部分则介绍此次开发的平台LINUX和软调环境;第3部分对几种网络协议做了简单的分析;第4部分分析了网络攻击及其防御措施;第5部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第6部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。

This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.

本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。

Except of complicated bridges that were equipped the high castles and underwater defensing installations, simple flat bridges and float bridges, there were a kind of iron chain bridges equipped cannons with recoil.

除带高楼与水下防御装置的复杂型和简易平板型船式及筏式浮桥外,尚有可以置放有后座力大炮的铁索桥。

Lived in the hidden land. Hence, she hasn't used the Frozen-cyan for a long time. Yet now, for defensing themselves, she finally draws the sword out. When the six-feet long blue aurora crosses through, all the arrows are broken.

自从获得童心的智慧,金灵的性子变得沈静不少,再加上住在水月洞天,凝碧剑已有多时未曾出鞘,此时为了自保,只好拔剑,六尺青芒过处,弩箭纷折

第2/2页 首页 < 1 2
推荐网络例句

Methods: Five patients with parkinsonism or dystonia were assigned to general anesthesia using an modified endotracheal tube.

本实验依照人体实验之相关规定进行,五位患有帕金森氏症或肌张力异常的病人接受神经立体定位手术。

If you can benefit from this book, it is our honour.

如果您能从本书获益,这将是我们的荣幸。

The report also shows that the proportion of unmarried men and women living together has doubled between 1986 and 2006, with 13 per cent of those aged 16 to 59 now cohabiting.

报告还指出,从1986年至2006年,英国未婚男女同居的比例增长了一倍,在16岁至59岁的人群中,有13%的人同居。