毒擊術 的英文怎麼說

中文拼音 [shù]
毒擊術 英文
poison strike
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  1. Various energies stemming from the realms of technology and the arcane are used to charge these mods, ranging from poison to cold to fire to concussive ( or physical ) damage types

    各種不同的能源從技的王國和神秘者阻止用來控訴這些信息存儲器,從藥到點燃到給與沖的(或實際的)損害類型。
  2. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有系統作出了系統化的安全方案,包括應用防火墻技、 vlav技和windows2000 )系統的安全機製作出的網路和系統平臺,防病和系統備份方案,根據公司中心機房建設的規模,以及中心機房所在地的現場條件,分別就空調系統、后備電源系統、防雷和系統監控給出實施方案。
  3. Demon prince qualities : orcus is immune to electricity and poison, and possesses acid and fire resistance 20 ; orcus can engage in telepathic communication with any creature within 100 feet ; orcus constantly detects good, detects magic, and sees invisibility as a 31st level sorcerer ; he possesses immunity to polymorphing, petrification, or any other attack to alter his form

    惡魔君主特性:奧庫斯免疫閃電與素,並且擁有強酸與火焰抗性各20 ;奧庫斯能通過心靈感應與100英尺范圍內的任何生物交談,奧庫斯身上總是附加有相當於31級士施展的偵測善良,偵測魔法以及偵測隱身效果,他免疫變形,石化,或者任何其他能夠改變其外形的攻
  4. Shadow hunter - cunning hero, adept at healing magics and voodoo curses. can learn healing wave, hex, serpent ward and big bad voodoo. attacks land and air units

    暗影獵手-靈敏的英雄,擅長治療法和詛咒巫.可以學習治療波,巫蛇守衛和巫.攻地面和空中單位
  5. Skeleton mages are undead and are vulnerable to undead - specific spells and abilities. skeleton mages have elemental attacks such as poison, cold, fire, and lightning

    骷髏法師是不死生物,對不死類的法或能力較容易受傷。會使用像冰、閃電、火或的元素系攻
  6. Special abilities : darkvision, magical poison, damage reduction 10 / bludgeoning, spell resistance, construct traits, does not mix well at parties

    特殊能力:黑暗視覺,魔法素,傷害減免10 /鈍,法抗力,構裝生物特性,不善於團隊行動。
  7. " we call the training viper u, " explains cdr. victor weber, operations officer at nsawc. " some call it viper vo - tech, " he quips

    「我們將這種訓練稱之為蛇追, 」 nsawc的行動指揮官維克托?韋伯中校解釋說。 「也有人把它叫作蛇的職業技訓練, 」他嘲諷道。
  8. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技,徹底解決黑客攻、木馬程序及網際網路病等各種網路危險的入侵,全面保護個人上網安全。
  9. Poison arrow master transformation skill for archers was bugged and was reducing hp by 100 % at level 1. that was supposed to be 10 % and is now fixed

    , 160級弓箭手的技能出現漏洞: 1級可以減少被攻玩家/怪物的血100 % , (一招致命! ! !強啊。 ) ,原先預計1級減血10 % ,現在已經修正回來了。
  10. This paper introduces the typical attack methords and theories in internet, and discusses the security features and defending measures of intranet according the real state of dalian diesel group ' s intranet. based on this, the technology of firewall, anti - virus and intrusion detection is especially analysed

    本文詳細介紹了因特網上目前常見的各種攻手段和攻原理,並結合大連柴油機廠內部網路的實際情況對intranet的安全特性和防範措施進行了一定探討,其中重點分析了防火墻技、防病和入侵檢測技
  11. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病等,設計出了保護中間業務的技安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
  12. At last, we apply dcds model to five applications, distributed attack, network probe, file recovery and load balance, are experimented and investigated. the initial results of our experimenting show that our dcds model and implementations are effective and feasible in practice

    針對分散式黑客攻、大規模病入侵、網路探測、文件的災難恢復和負載平衡等五種具體的應用實例,分別給出了具體實現過程及其實驗結果,實例應用結果表明,我們提出的解決問題的思路、技方案及其實現方法是可行性的、有效性的。
分享友人