攻擊術 的英文怎麼說

中文拼音 [gōngshù]
攻擊術 英文
attack
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技包括路由器、防火墻、漏洞防堵、入侵檢測、審計和反等,其中路由器過濾、防火墻、漏洞防堵屬于靜態安全技,而入侵檢測、審計和反等屬于動態防護。
  2. General speaking, the detection of the vulnerability is a technique filled with inspiration and luck, but thorough analysis shows it is also deducible. if more people understand the hacking technique, it will no longer be magic mastered only by a few experts

    總的來說,漏洞的發現和利用雖然是一項充滿了靈感和機遇的技,但是仔細分析起來,其中仍然存在明顯的規律,掌握了這些規律,就不單單是少數專家手中的魔,而可以被更多的人所掌握,為國家所用。
  3. At the begin of the dissertation, we has discussed the state of security on internet, analyzed the factors caused frangibility of internet, and intrude some means used to provide security services for internet

    本文從網路安全的現狀談起,探討了網路安全的主要威脅因素和相應的手段,同時也歸納了針對這些威脅因素和手段而採取的提高網路安全的安全措施和技手段。
  4. The research does not demonstrate that watching violent acts in films or television shows directly and immediately causes people to commit violent acts. rather, the scholarly evidence cited by mr. mcintyre either demonstrates cumulative effects of violent entertainment or establishes it as a " risk factor " that contributes to increasing a person s aggressiveness

    研究並沒有指出觀看暴力節目會直接立即導致人們的暴力行為,但是麥因泰爾所舉出的學證明顯示,暴力節目的影響日積月累,是造成人們行為的一個危險因素。
  5. There are various tactics or methods for giving effect to this principle, such as dispersion and concentration of forces, diverging advance and converging attack, the offensive and the defensive, assault and containment, encirclement and outflanking, advance and retreat

    執行這個方針,有兵力的分散和集中、分進和合和防禦、突和鉗制、包圍和迂迴、前進和後退種種的戰或方法。
  6. Tier 9 pacify requires 1 point in power infusion requires 40 points in discipline talents 10 % of base mana 30 yd range 1. 5 sec cast 2 min cooldown telepathically induce a state of pacifism, making the target unable to attack or use any offensive spells or abilities for 10 seconds

    撫慰(戒律系終極天賦)需要: 1點能量灌注前置需要: 40點戒律系天賦10 %基礎法力值30碼距離1 . 5秒施法時間2分鐘冷卻時間利用心靈感應達成寧靜狀態,使目標無法或使用性法及技能,持續10秒。
  7. Demon prince qualities : orcus is immune to electricity and poison, and possesses acid and fire resistance 20 ; orcus can engage in telepathic communication with any creature within 100 feet ; orcus constantly detects good, detects magic, and sees invisibility as a 31st level sorcerer ; he possesses immunity to polymorphing, petrification, or any other attack to alter his form

    惡魔君主特性:奧庫斯免疫閃電與毒素,並且擁有強酸與火焰抗性各20 ;奧庫斯能通過心靈感應與100英尺范圍內的任何生物交談,奧庫斯身上總是附加有相當於31級士施展的偵測善良,偵測魔法以及偵測隱身效果,他免疫變形,石化,或者任何其他能夠改變其外形的
  8. And it seemeth his favor was so great, as antonius, in a letter which is recited verbatim in one of cicero ' s philippics, calleth him venefica, witch ; as if he had enchanted caesar

    安東尼在一封信里(這封信在西塞羅的演說之一中曾經一字不移地引用過)曾呼代西瑪斯?布魯塔斯為「妖人」 ,好像他用邪迷惑了愷撒似的,他的得寵之深可見矣。
  9. ( 3 ) based on rivalship model, the process of attack information handling is studied

    ( 3 )研究了信息對抗下的信息決策技
  10. In the age of information, security system does not mean a simple pure protection, but the great rivalship between the security officers ( so ) and virtual attackers ( va ). some cyberspace security systems only give the defense framework, which is the integration of different protection technologies based on the system security management requirements, but not based on the understanding of information rivalry

    在信息技高速發展的時代,網路安全已不再是單純的防禦技,而越來越成為安全管理員( securityofficers , so )與虛擬者( virtualattackers , va )之間信息與知識的對抗。
  11. ( 4 ) presents the methods of detecting and protecting the ip hijack and smurf attack based on analyzing their attacking principle

    ( 4 )在分析ip劫持和smurf實施原理的基礎上,提出這兩種的檢測方法和防範技
  12. Talons. your unarmed attacks deal + 1 damage

    魔爪:你的徒手造成+ 1點額外傷害。
  13. Shadow hunter - cunning hero, adept at healing magics and voodoo curses. can learn healing wave, hex, serpent ward and big bad voodoo. attacks land and air units

    暗影獵手-靈敏的英雄,擅長治療法和詛咒巫.可以學習治療波,巫,毒蛇守衛和巫毒.地面和空中單位
  14. Our study concentrates on the birthday attack, the length extension attack, the differential analysis, the message modification method, the multi - collision attack, the fixed point attack and the neutral bit attak

    重點介紹了其中幾種起關鍵作用的:生日、長度擴展、差分分析技、多沖突、消息修改技、固定點和不相關位
  15. The topic of the thesis is to research fast response system ( frs ). the research aims to construct the architecture of frs for detecting intrusion, tracing attack source, correlating alerts, evaluating the damage of attack, describing attack, and taking automatic response to attack. three related projects, cooperative intrusion traceback and response architecture ( citra ), automatic intrusion detection environment, and adaptive, agent - based, intrusion response system ( aairs ), are analyzed

    本文旨在對快速反應技進行研究,建立針對網路的快速反應系統,該系統具有入侵檢測、源回溯功能;通過報警信息的關聯、破壞力的分析,以及的準確描述,完成對常見網路的準確定義;並且根據描述信息,自動對進行響應,達到有效地阻止的目的。
  16. Furthermore the character may not use combat expertise, defensive fighting, or any other inappropriate feat or manoeuvre with a ferocious attack

    此外,玩家不能在兇猛中使用戰斗專家、御守于以及一切不恰當的專長與戰動作。
  17. Article 23 the acts that divulge the secret of commercial password techniques, unlawfully attack the commercial passwords or conduct the activities impairing the security and interest of the state with commercial passwords and constitute a crime in serious cases shall be legally investigated into the criminal responsibility

    第二十三條泄露商用密碼技秘密、非法商用密碼或者利用商用密碼從事危害國家的安全和利益的活動,情節嚴重,構成犯罪的,依法追究刑事責任。
  18. Dread knight will need to properly use her stances, lifetaps, fear spells, special attacks and tactical maneuvers to fulfill her various group roles

    恐懼騎士應當適當地使用姿態,吸血,恐嚇技能,特殊和戰機動去完成他在各種團隊中的角色。
  19. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技:將智能體( agent )技應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技和誤用檢測技,採用一種混合型的結構,既能檢測已知的模式,又能發現新的模式。
  20. This is a powerful weapon, which shoots a lethal bolt of fire. if this fire bolt strikes the ground, it will explode with great force. up to 50 uses

    這是一個強有力的武器,我感覺有點像魔彈。 。 。 。 ,如果地面,將產生巨大的爆炸。
分享友人