英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

War critics astonished as US hawk admits invasion was illegal Oliver Burkeman and Julian Borger in Washington The Guardian International lawyers and anti-war campaigners reacted with astonishment yesterday after the influential Pentagon hawk Richard Perle conceded that the invasion of Iraq had been illegal.

战争的批评感到惊讶,因为美国鹰派承认入侵是非法的奥利弗burkeman和朱利安borger在华盛顿的监护人国际律师和反战运动的反应感到惊讶昨天后,有影响力的五角大楼鹰派理查德珀尔承认入侵伊拉克已illegal.in惊人突破与官方,白宫和唐宁街线议员,珀尔告诉观众在伦敦说:我。。。

Avoid Bacterial invasion: to avoid bacterial invasion Wash your hands before using the product, cap tightly after use to be.

避免细菌入侵:要避免细菌入侵,使用产品前要洗手,用后要盖紧瓶盖。

Avoid Bacterial invasion: to avoid bacterial invasion Wash your hands before using the product, cap tightly after use to be. Sharing with others will increase the infection of cosmetics, conjunctivitis, influenza risk, in particular, and others do not share eye make-up products mouth.?

避免细菌入侵:要避免细菌入侵,使用产品前要洗手,用后要盖紧瓶盖与别人共用化妆品会增加感染结膜炎、流行性感冒的危险,尤其不要和别人共用口眼彩妆品。

We present the research into and analysis of many kinds of security resolution in the thesis. Based on the analysis, we propose a security defense framework, in which IPS takes main role and honeypot is complemental. Meanwhile we give the design and implementation of the new network-based IPS.

本文研究分析了多种安全解决方案的优缺点,在此基础上提出了一种以入侵防御系统为主、蜜罐为辅助的安全防御框架,并给出新型的基于网络的入侵防御系统的设计与实现过程。

Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. In these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques.

目前网络安全技术包括路由器过滤、防火墙、漏洞防堵、入侵检测、审计和反攻击等,其中路由器过滤、防火墙、漏洞防堵属于静态安全技术,而入侵检测、审计和反攻击等属于动态防护。

Based on the CRIM module within MIRADOR project,an algorithm is designed to merge these similar alert s to reduce the existing huge numbers of alarms.

为了解决网络的入侵检测系统经常产生大量相似的或无用的警报数据的问题,依据法国MIRADOR项目的用于入侵检测系统的关联模型的相关研究工作,设计了一种警报合成算法。

The design and implement of intrusion detecting engine in intrusion detection system is the core part of this paper .

入侵检测系统中的入侵检测引擎的设计和实现是本文的核心部分。

With the development of computer network, problems of network security have become increasingly prominent, and network intrusion has become more and more serious. Currently, there are no effective means for locating and confirming the intrusion events that have happened, and it is difficult to block network attacks and form powerful determent for network attacker.

随着计算机网络的发展,网络安全问题变得日益突出,网络入侵现象也越来越严重,而目前缺乏有效的手段对入侵行为进行定位以及事后取证,因此很难有效遏制网络攻击,并形成对网络攻击者的强有力的威慑。

The ways of intrusion are karst fissure, structural fracture and the intrusion in contact-zone of diabase and rock.

海水入侵的途径有裂隙岩溶、构造断裂及辉绿岩体与基岩的接触带入侵

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

第7/100页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
推荐网络例句

He and Nina moved to California and lived at 2005 Ivar Street, Apt.

他和Nina搬到加州,并在2005年伊瓦尔街,公寓生活。

Droperidol ( potently inhibits transfected HERGchannels and this is the probable mechanism for QT prolongation.

氟哌利多有效地抑制了转染的 HERG 钾通道,可能是 QT 间期延长的机制。

The Nazi's cruel treatment of the Jews during the Second World War is beneath contempt .

二战期间纳粹对犹太人的暴行极其可鄙。