防禦主機 的英文怎麼說

中文拼音 [fángzhǔ]
防禦主機 英文
bastion host
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : machineengine
  • 防禦 : defense
  1. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「網路集成系統」 ,通過對網路中各節點火墻進行管理,在實現多聯合領域進行了探索研究。
  2. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於火墻和病毒軟體的制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算系統的動態行為特徵並據此判斷是否有入侵的措施。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態以及協同通信平臺等關鍵技術開展研究工作,所做的工作要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算信息系統安全體系建設的動態縱深安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  4. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界火墻及現有火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等火墻技術,設計了一種企業網中的火墻模型,並對這一模型進行了較深入地研究。
  5. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種技術,彌補了傳統的以火墻為基礎的被動的網路安全制的不足,成為當前範網路攻擊的要手段。
  6. Nonspecific cellular defense mechanisms in the lung rest principally on epithelial cell elements and several types of phagocytic cell.

    肺中非特異性細胞要在於表皮細胞和幾種有吞噬作用的細胞。
  7. Vizcaino ( 7. 50 era ) was frustrated after allowing three runs, two hits and two walks while getting three outs. a television camera caught him knocking over cups in the dugout

    率7 . 50 )丟掉3分之後非常?氣,他投一局被擊出兩支安打併投出兩次保送。有一部電視攝影抓到他在球員休息區摔杯子的鏡頭。
  8. Whereafter, based on the analysis on the flood influence for traffic lines, the research is centered on the following parts : firstly, the destroying modes, reasons and mechanism of flooded lines are discussed, and the frameworks and countermeasures of preventing and controlling hazards system are put forward ; secondly, the ways of region forecasting for the landslide are analyzed and the automation of landslide forecast for certain site through visual programming is realized. furthermore, the function of dynamic segmentation in arc view is made use of to realize the forecast result ' s visualization ; thirdly, the reasons and patterns of roadbed subsidence are discussed and the methods of forecasting subsidence based on the gm ( 1, 1 ) model are put forward. then the applications of the arcview software and its extended module on the study of roadbed subsidence are debates upon ; fourthly, an analysis on the sources of flood for traffic lines, which situate in the reservoir coverage area, is given

    接著,論文探討了山區交通線路災害的特點、分類、時間和空間分佈規律以及災害的治原則和對策等;然後,以洪水災害對交通線路的毀壞為線,重點研究和分析了以下幾個問題:第一,探討了洪水對交通線路的破壞方式,水毀原因以及水毀理,並提出了交通線路水毀系統框架和對策;第二,分析了雨季邊坡塌方災害的區段預測方法;通過可視化編程,編制了雨季邊坡塌方災害的工點預報程序,並結合arcview實現了預測結果的可視化;第三,對路基沉陷原因和模式進行了分析,並提出利用gm ( 1 , 1 )模型對路基沉陷區進行分析和預測,最後論述了arcview軟體及其擴展模塊在沉陷區研究分析中的應用;第四,對汛期庫區線路災害的原因進行了分析,並探討了利用數量化理論對路基護工程抗洪能力進行預測的意義;第五,提出從風險的角度對交通線路的災減災進行管理,對風險估計的相關問題進行了論述,並探討了交通線路水害危險區段的劃分問題。
  9. The ultra - near anti - missile system for tank ( uast ) is a kind of intelligent weapon systems for tank to avoid attacks from anti - tank missiles in battlefield. uast is mainly composed of radar detecting system, computer system and counterattacking bomb system

    坦克超近反導系統是戰坦克反坦克導彈攻擊的一種智能型武器,要由雷達探測系統、計算系統和反擊彈系統組成。
  10. In recent years, for the irrational use of antibiotics produces resistant strains and other reasons, bacterial resistance is more and more serious. human are trying to solve the problem from different ways, including the study of antimicrobial peptides. defensin is one of the most important of antimicrobial peptides

    素( defensin )是抗菌肽中較為重要的一種,是一種生物體產生的具有強大的抗菌功能的陽離子小分子多肽,要來源於皮膚、呼吸道等的上皮組織,是正常體抵抗外界病原微生物入侵的重要線。
  11. Terran have bunker and turrets as main - defence, ( 1 ) is sensory - turret, ( 2 ) is radar - turret ( both are not shown in picture ). next to bunker an unknown building is shown : a machine gun

    人族擁有碉堡和塔作為手段, ( 1 )是傳感器塔, ( 2 )是雷達塔(二者都未出現在圖片中) 。碉堡旁邊是一個未知的人族建築:一座械火炮。
  12. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos方法作為反向追蹤有用的補充,將系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  13. Information security defense mechanism is changed from passivity to initiative as the information times going, so honeypot technology is more and more regarded as an effective way to anti - attack

    信息時代的到來需要計算安全護由被動轉為,從而使蜜罐技術在網路對抗中日益受到重視。
  14. When the defensive power of the host is temporarily equal to the invasive power of the parasites, a small number of parasites can live or reproduce in the body. though they may not cause harm or clinical symptoms to the organism, the host will become a carrier of pathogens disease - causing agents

    若宿力量與寄生蟲的侵襲力,處于暫時平衡時,侵入的少量寄生蟲,可在人體內存活或繁殖,尚不致於對體造成危害,不會出現臨床癥狀,但可傳播病原體而成為帶蟲者。
  15. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管理需要的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自知識產權且能與國際接軌的技術標準,以提高國內信息網路能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國建設、尖端科學技術等重要領域的計算信息系統的安全。
  16. X - band ground based radar ( gbr ) plays an important role in national missile defense ( nmd ) system, it has many important functions such as middle stage surveillance and interception, trajectory prediction, target identifying and classifying. it has important significance to analyze and study gbr system, not only for ballistic missile ’ attack and defense research, but also for our national space surveillance and ballistic missile defense system development

    X波段地基雷達( gbr )是美國國家導彈系統中段和攔截系統中最要和最有效的目標精確跟蹤和識別傳感器之一,它負責中段監視和截獲、預測彈道和實測彈道的精度、識別和目標分類等重要功能,對gbr的系統分析和模擬研究,探究其工作理和識別手段,不但對于研究彈道導彈的有效突措施和攻對抗有著重要意義,對于發展我國自己的空間監測和彈道導彈系統也有著重要的參考價值。
  17. Article 28 competent meteorological departments at all levels shall make arrangements for joint monitoring and forecast of significant weather events among regions or departments, propose timely measures for preventing meteorological disasters and make assessment of severe weather disasters, which shall serve as the decision making basis for the people ' s governments at the corresponding levels to arrange prevention of meteorological disasters

    第二十八條各級氣象構應當組織對重大災害性天氣的跨地區、跨部門的聯合監測、預報工作,及時提出氣象災害措施,並對重大氣象災害作出評估,為本級人民政府組織氣象災害提供決策依據。
  18. When the defensive power of a host is greater than the invasive power of parasites, the parasites entering the organism are totally destroyed or expelled from the body

    若宿力量大於寄生蟲的侵襲力時,進入體內的寄生蟲,會全部被殺滅或排出體外。
  19. Antibacterial peptides have been recognized as important mediators of innate immunity against microbes

    抗菌肽是體抵抗外源微生物入侵的第一道線,在宿先天免疫制中起重要作用。
  20. The authors works as the manager for mead ' s wrol business in china, based on the vast amount of primary and first - hand data and market information collected, the author conducted an in - depth analysis on the product life cycle of laminate flooring in china and the leading indicators of its phase turning points, industry economic dynamics, competitive situation, the forces driving the industry changes. the author has tried to forecast and project the prospect and development trend of laminate flooring industry in china. based on this trend analysis, the author analyzes the competitive environment and competitive forces that mead wrol business is facing, and the strength and weakness of mead ' s internal resources by using michael porters " 5 - forces model and swot analysis model and reformulate the business strategy of mead wrol in china

    作者在深入了解了耐磨表層紙產品的要市場- - - -中國強化復合地板市場的發展趨勢的基礎上,進一步通過運用五種競爭力量模型、企業swot分析等原理深入分析了美德公司耐磨表層紙產品目前所處的競爭環境、面臨的競爭壓力,以及美德公司自身的資源優劣勢、市場會與潛在威脅等,最終依據保持公司核心競爭能力,把握市場增長會,建立對危及公司競爭地位和未來業績的外部威脅的有效的原則,規劃出美德公司耐磨表層紙產品在中國市場的經營策略,以保證其適應外部競爭環境的發展變化,保持美德公司在中國強化復合地板行業耐磨表層紙供應中的領先競爭地位。
分享友人