易受攻擊 的英文怎麼說

中文拼音 [shòugōng]
易受攻擊 英文
vulnerable : easily harmed hurt or wounded weak easily attacked
  • : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 易受 : liable to
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The troops had to withdraw to a less exposed position.

    部隊已經撤到不易受攻擊的地點。
  2. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。
  3. But even in countries ( like america ) without extremist parties on the left or the right, politicians will be tempted to deflect the voters ' wrath away from their corporate paymasters and towards an easier target ? “ foreigners ” of all types

    但即使是在無極左或極右黨派的國家(像美國)內,政治家亦傾向于將選民的憤怒從公司發薪人員身上移開,而轉向一個更易受攻擊的目標? ?所有的「外國人」 。
  4. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路加密和端到端加密措施。
  5. But, the patient if because age is old, or it is to contract the disease with meeting immunize low function ( be like : diabetic, aids ) when, will make hepatic defence function is reduced, and the condition that makes liver exposeds to the open air wu yi suffers attack

    但是,病人假如因為年紀大,或是患有會使免疫功能低下的疾病(如:糖尿病、 aids等)時,將會使肝臟的防禦功能降低,而使肝臟曝露于易受攻擊的狀態。
  6. These states include good state, vulnerable state, degradation state and failed state. there are difference security policies according different state

    我們把網路系統的安全狀態分為四個等級:正常狀態、易受攻擊狀態、服務退化狀態和被狀態,它們分別對應著不同的安全策略。
  7. For the purpose to perfect the risk assessment of major hazard installation, a vulnerability assessment methodology for industrial facilities is developed on the basis of relativity between target selection of attack and certain inherence of industrial facilities ( especially the industrial facilities involve a store of chemical or energy )

    摘要為使重大危險源風險分析更加完善,從者的角度分析工業設施(主要指化學物質或能量聚集的工業設施)固有特徵中影響襲目標選擇的諸因素,提出易受攻擊性指標。
  8. Is software security a feature ? is security vulnerability a bug

    (軟體安全是必不可少的?易受攻擊是個缺陷? )
  9. Theory of computing, hersonissos, greece, 2001, pp. 163 - 172. 18 homan c m, istrate g. small worlds, locality, and flooding on landscapes

    由於各連接邊是根據隨機分佈生成,整個網路不易受攻擊,因而具有良好的fault tolerance 。
  10. In this position, our ships lie open to attack

    在這個位置,我們的船易受攻擊
  11. He has a position vulnerable to criticism / attack

    他的地位易受攻擊批評。
  12. It only updates vulnerable files

    它只更新易受攻擊的文件。
  13. Also protects against vulnerable parameters passed into a function

    還可以防止向函數傳入易受攻擊的參數。
  14. Where do you think we ? re the most vulnerable as a business

    問:作為一家企業,你認為我們哪些領域最易受攻擊
  15. A vulnerable parameter is allocated before the cookie and local variables

    易受攻擊的參數在cookie和局部變量之前分配。
  16. Keeping track of multiple machines can increase efficiency and reduce vulnerability

    跟蹤多臺機器能提高效率並降低易受攻擊
  17. We are vulnerable both by water and land, without either fleet or army

    由於沒有艦隊和軍隊,我們在水路和陸路上都易受攻擊
  18. Sql check also identifies vulnerable sql server 2000 clusters, but does not disable them

    Sql檢查程序也能識別易受攻擊的sql server群集,但不會禁用他們。
  19. Describes how to minimize the vulnerable surface area of an installation of sql server 2005

    介紹了如何最大程度地減小sql server 2005安裝的易受攻擊的外圍應用。
  20. All wireless communication is vulnerable to dos as someone can deliberately jam the frequency

    所有無線通信對于dos都是易受攻擊的,因為有人可以故意干擾該頻率。
分享友人