英语人>网络例句>访问 相关的搜索结果
网络例句

访问

与 访问 相关的网络例句 [注:此内容来源于网络,仅供参考]

President Nixon and his party visited Peking and viewed cultural, industrial and agriculture sites, and they also toured Hangchow and Shanghai where, continuing discussions with Chinese leaders, they viewed similar places of interest.

尼克松总统及其一行访问了北京,参观了文化、工业和农业项目,还访问了杭州和上海,在那里继续同中国领导人进行讨论,并参观了类似的项目。

Keys can be hashed using hasher which is accessed by member function hash_function, and checked for equality using key_equal which is accessed by member function key_eq.

键值可以用 hasher 来散列,它通过成员函数 hash_function 访问,并且键值使用 key_equal 来检查等同性,它通过成员函数 key_eq 访问

Today many websites have done away with the concept of visited links, choosing to style them identically to unvisited links. Lisa Herrod wonders why.

如今,很多网站都抛弃了删除访问过的链接的观念,他们像美化没有访问过的链接那样美化这些链接, Lisa Herrod 对此很迷茫。

An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router.

问题:设计一个访问控列表阻止http流量从财务部到人力资源部,以下哪一个访问控制列表配置正确?

Access your favorite and recently visited folders and documents with one mouse click or hot key.

访问您最喜爱的和最近访问的文件夹和文件,只需点击一下鼠标即可或热的关键。

Since the firewall to prevent illegal network access, then access is not legally prevented even easier?

既然防火墙能阻止非法的网络访问,那么合法的访问不就更容易阻止了?

The scheme is safer than the previously proposed schemes. In the scheme, the user s secret key is used not only for computing the corresponding access privilege to the intended file, but also for authenticating the requesting user not to illegitimately access the protected file.

该方案与已有类似方案相比要更安全一些,因为在该方案中,用户保密密钥不仅用来计算对所需访问文件的存取权,也用于认证需访问保密文件的请求用户的合法性。

People have imminence needs to find out the "interested" information from the user browsing log.

通过对Web用户的访问信息进行有效的数据挖掘,可以获得有关Web用户访问行为的知识。

The security mechanisms can improve access control model to impersonate the user access monitoring and control capabilities.

该安全机制能有效提高访问控制模型对冒充用户访问的监测及控制能力。

This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.

本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。

第11/100页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher