網際協議 的英文怎麼說

中文拼音 [wǎngxié]
網際協議 英文
iinternet protocol
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ名詞1 (靠邊的或分界的地方) border; boundary; edge 2 (里邊; 中間) inside 3 (彼此之間) betwe...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 網際 : cyber
  1. The high - level framework divides, as shown on the right, the solution stack into mobile middleware, internet protocol suite, operating system, and computing and communication hardware

    該高層框架將解決方案棧分為,移動中間件,簇,操作系統,和計算和通訊硬體。
  2. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip對我國internet的發展起著決定性作用,重慶電信163 / 169路是國家骨幹在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip,現擁有近20萬用戶,佔全市路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的自身的脆弱性;主機、路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  3. The types of data collected by us include the browser type and version, the operating system, the ip address and the domain name of the server

    我們透過曲奇檔案收集的資料,包括閣下使用的頁瀏覽器類型及版本、電腦操作系統、地址,以及伺服器的域名等。
  4. Session information such as ip ( internet protocol ) addresses, browser types, operating systems are also used for zuji s system administration

    亦會使用話路資料(如ip ()地址、瀏覽器類別、作業系統等) ,作為zuji的系統管理用途。
  5. It considers the every application facets for the entire network, focuses on center of network security. it describes the most important conceptions and minds in designing firewall. at the same time, it also introduces what is input packet, output packet, their ideas based on firewall as well

    介紹tcp ip (傳輸控制網際協議以及防火墻常用的ip消息類型tcp (傳輸控制) 、 udp (用戶數據報) 、 icmp (控制報文)及其在路傳輸中的作用、介紹數據輸出包、數據輸入包的概念及其基於防火墻中的思想。
  6. Transmission control protocol internet protocol tcp ip

    傳輸控制
  7. Tcp ip transmission control protocol internet protocol

    傳輸控制網際協議
  8. This article is an in - depth guide to a better understanding of the open services gateway initiative osgi programming framework and api with a focus on how to apply them to practical service management framework bundle development

    本文是一個具有一定深度的學習指南,幫助用戶更好的理解開放服務( osgi )編程框架和api ,重在討論如何將它們應用到實的服務管理框架包的開發中去。
  9. Shows a simplified figure of the internet protocol stack with ethernet assumed as the underlying physical network technology

    圖1顯示了將以太假定為底層物理路技術時的網際協議( internet protocol )棧的簡化圖。
  10. Tunneling component network protocols over internet protocol channels

    互連通道上的遂穿元件
  11. The host name is an internet protocol version 4 host address

    主機名是網際協議( ip )第4版主機地址。
  12. The host name is an internet protocol version 6 host address

    主機名是網際協議( ip )第6版主機地址。
  13. Ipvn internet protocol virtual private network

    網際協議虛擬專用通信
  14. Advanced settings such as the internet protocol ( ip ) or ip address

    高級設置,例如網際協議( ip )或ip地址
  15. Gets the internet protocol address family

    獲取網際協議( ip )地址族。
  16. Isdn : integrated service digital network

    網際協議
  17. Internet protocol over atm, ipoa

    上的網際協議
  18. Which of the following are layers of the tcp / ip model ? ( choose three

    如下內容中的哪些是層傳輸控制/網際協議模型
  19. This service is used by the next higher level protocol : the internet protocol

    高一級別的網際協議( ip )使用這一服務。
  20. Windows 2000 supports the following scalable security technologies : kerberos v5 protocol, smart card, public key cryptography, and internet protocol security ( ipsec )

    Windows2000支持下列可升級的安全技術: kerberosv5、智能卡、公用密鑰加密系統和網際協議安全保護( ipsec ) 。
分享友人