防禦墻 的英文怎麼說

中文拼音 [fáng]
防禦墻 英文
barricade
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • 防禦 : defense
  1. Jinshanling section of the great wall forms an impregnable and distinctive defense system by conterminous passes and watchtowers, layer upon layer of walls, and interlacing zones of fire, where such military facilities as warehouse towers, jinshan towers and single - side walls are typical along the great wall

    金山嶺長城城關相連、敵樓相望、重城護衛、射界交叉,組成了一道嚴密獨到的體系,其中有許多軍事設施如庫房樓、大、小金山樓、單邊等為萬里長城所罕見。
  2. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph

    入侵檢測是一種主動技術,它彌補了、信息加密等傳統安全技術的不足。
  3. The walls of york were strong defences.

    約克郡的城曾經是堅固的工事。
  4. Embattled - fire or the walls of a fortress or town

    狀線條火,或是指城塞、村鎮的工事。
  5. The house consists of three rows of houses arranged to form a rectangle. all the houses are interlinked by passages and small courtyards. embrasures and loopholes were arranged orderly on the fortified walls and defensive towers were built at the four corners to ward off enemies

    曾大屋呈長方形,共三進。屋與屋之間有通道及天井相連;圍上有排列整齊之槍孔及瞭望孔,圍的四角有更樓和炮樓,用以外敵入侵。
  6. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「網路集成系統」 ,通過對網路中各節點主機的進行管理,在實現多機聯合領域進行了探索研究。
  7. We ' re past the firewalls, local defense nets, minutemen, subs

    我們通過了、局部和支網
  8. At the foot of its ramparts, on red square, st basil ' s basilica is one of the most beautiful russian orthodox monuments

    在紅場上的腳下坐落的聖瓦西里教堂是俄羅斯傳統藝術最漂亮的代表作之一。
  9. The ruins of the immense fort, with its walls and towers of unbaked brick and its stone foundations, is a remarkable example of this type of fortification and attests to the power of the banu nebhan

    這個龐大堡壘的廢墟有土製的城和碉堡以及用石頭打的地基,是此類型工事中突出的例子,由此也可以看出巴努紡誆己輩柯淞康那看蟆
  10. Several battalions of soldiers, in their shirt - sleeves, in spite of the cold wind were toiling like white ants at these entrenchments ; from the trench they saw spadefuls of red clay continually being thrown out by unseen hands

    寒風凜冽,幾個營的士兵都穿著一件襯衣,像白蟻似地在工事上蠕動。望不見的人在土後面鏟出一鍬一鍬的紅土。
  11. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於病毒軟體的主動機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動措施。
  12. People used to build strong walls round their towns as a defence against enemies.

    人們從前在城鎮四周築堅固城敵人。
  13. In addition, firewalls are no defence against internal hackers

    此外,無法內部黑客。
  14. Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )

    文中針對單系統、堡壘屏蔽子網、帶dmz (非軍事化區)帶三種不同網路拓撲結構加以說明,闡述nat (網路地址轉換)的原理和dmz工作原理以及它們的相應網路拓撲結構。同時給出基於dns服務的相關腳本。
  15. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界及現有主機的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等技術,設計了一種企業網中的主機模型,並對這一模型進行了較深入地研究。
  16. Kat hing wai, in the east of yuen long town centre, has a very long history. it was built during the ch ing - hua period ( 1465 - 87 ) of the ming dynasty. the walled village is in the shape of a square completely surrounded by brick walls erected to protect the villagers against thieves

    吉慶圍建於明朝成化年間(公元一四六五年至一四八七年) ,呈方形的外由青磚築成,長一百公尺,四角設有炮樓,具有高度盜賊的作用。
  17. He shall recount his worthies : they shall stumble in their walk ; they shall make haste to the wall thereof, and the defence shall be prepared

    亞述王召集他的權臣,他們碰碰跌跌而來,急急忙忙走上城,豎起了的擋牌。
  18. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動技術,彌補了傳統的以為基礎的被動的網路安全機制的不足,成為當前範網路攻擊的主要手段。
  19. Built on sheer mountain ridges, it has perfect defense works formed by watchtowers, battlements, barracks, and etc

    建在陡峭山脊之上,敵樓墩臺、邊城掩體,水關煙墩等形成了完備的軍事體系。
  20. Wearing light armour, they are capable of presenting a defensive wall made up of rows of steel pikes waiting to impale charging foes

    他們身穿輕甲,可以用鋼制槍頭組成敵人沖鋒的銅鐵壁。
分享友人