目的主機 的英文怎麼說

中文拼音 [dezhǔ]
目的主機 英文
destination host
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  • : 4次方是 The fourth power of 2 is direction
  • : machineengine
  • 目的 : purpose; aim; goal; objective; end
  1. The ccu host computer of bosch is the most advanced host system at present

    博世ccu前最先進系統。
  2. A _ dids can be distributed on any host in the network. a _ dids has good distribute and scalable ability because of its four - tier distributed architecture and flexible agent system

    A _ dids可以分佈在網路中任意數目的主機上,其四層分散式體系結構和靈活代理體系,使得系統具有很強分佈性和擴展性。
  3. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多入侵事件中,黑客往往通過感染關鍵系統進程獲得系統權限,並在成功入侵后在留下木馬、后門作為下次入侵捷徑,所以對這些受感染系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究重要課題之一。
  4. For example, an attacker may break into a honeynet, then launch an outbound attack never seen before, successfully harming or compromising its intended victim

    比如說,一個攻擊者可能侵入蜜網,然後發起一次對外以前從來沒見過攻擊,成功損害或攻陷了它
  5. Can use stress patterns, words in stress, rhythmic structures, and intonation contours in order to make the utterance fit for the aim, motivation, attitudes, state of emotions, etc

    能夠運用重音、邏輯重音、節奏和各種語調變換來適應溝通、動、態度以及情緒情感變化。要是通過各種特定形式來表達不同態度和情感。
  6. The purpose of this subject is to implement a transparent proxy server based on linux os which can provide intranet host network security

    本課題標是完成一套基於linux操作系統透明代理型防火墻軟體,為在內部網提供安全保護。
  7. So that how to adjust and reform our government functions in the infrastructure field while to promote the efficiency and benefit, has been one of the nuclear things that has affected the reformation of government functions in infrastructure invest - finance system

    基礎設施建設投資動要是為了獲取社會效益和環境效益。基礎設施建設投資資金來源渠道單一,要依靠政府財政,由財政無償撥款或由財政舉債籌措等。
  8. The asic chip embedded with bluetooth is usually employed as keyboard mouse equipment controller at present, so that is complicated and expensive to realize. noteworthily a new style of design is developed in the article : a 51 mcu is employed as keyboard mouse equipment controller while controlling bluetooth module as host, which give full play to 51 mcu and make the product at low cost, the design has sure practicability and innovative ; the software of pc end is designed as operating in the backstage, which receives data from usb interface to simulate the function of the keyboard and mouse. the design is easy, the thought is ingenious

    由於前常見藍牙鍵盤鼠標設備控制器都是用嵌入藍牙核asic晶元實現,所以實現復雜而且價格昂貴,而文中設計獨辟蹊徑:用一片51單片作鍵盤和鼠標微控制器,兼作控制藍牙模塊,充分發揮了51單片性能,實現了低成本設計,具有一定實用性和創新性; pc端軟體則設計為運行在後臺應用程序,接收usb介面數據並進行處理,以模擬鍵盤鼠標功能,這一設計簡單易行,思路巧妙。
  9. According to the conclusion of this thesis, we can claim that deception and lure increase the attacker ' s workload because they ca n ' t easily tell which of their attack attempts work and which fail. this method also exhausts attacker resources, increases the sophistication required for attack, all of these are help for computer network security

    通過理論證明和試驗驗證,欺騙誘導系統使攻擊者對標進攻難度加大,增加了攻擊者工作量,消耗了攻擊者資源,延長了攻擊者攻擊時間,將攻擊誘導到蜜罐系統,保護了安全。
  10. Since no host trust relationships have been formed, the first time you ssh into a new host, you will be prompted with a message saying that the authenticity of the target host cannot be established, and you will be asked if you would like to continue

    由於還沒有形成信任關系,在第一次ssh到一個新時,您將看到一條提示消息,告訴您不能建立認證,並且被詢問是否要繼續。
  11. Continual upgrading of the resource pool ' s hardware causes the total speed and capacity of this ber - computer to increase even faster than the number of connected hosts

    持續升級資源庫里硬體,會讓這臺超級電腦總體速度和容量增加得比連結要快。
  12. Destination host unknown

    目的主機未知
  13. Destination host administratively prohibited

    目的主機被強制禁止
  14. In the internet, the aim host is accessed by the ip address

    在internet網路中,必須通過ip地址來訪問目的主機
  15. Multicast consists of concurrently sending the same information from a source to a subset of all possible destinations in computer network

    多播是一種允許一個向多個目的主機(但不是所有)發送同一信息通信方式。
  16. System administrator can generate agent or dispatch agent to destination hosts. once the agent dispatch to the host on which maids _ station had been installed, the agent can run and monitor the network

    從而管理員可以在maids端生成需要代理,派發到目的主機,由移動代理監視,執行入侵檢測任務。
  17. The first component is presented around two questions. to answer the question “ how to migrate ”, a process migration algorithm is proposed basing on three migration conditions. the second question is “ which process is the source host, which process is the destination host, which process should be chosen to migrate and when ? ” to answer the question, a improved means of migration mechanism is presented

    在整個理論分析部分,要是圍繞著兩個問題進行展開論述: ( 1 )如何遷移,使得進程能夠在新上正確運行,即進程遷移演算法; ( 2 )遷移制,即由哪臺(源)選擇哪個進程向哪臺遷移(目的主機) 。
  18. Adapter module servers as the bridge of different system and transmits messages. intelligent routing module can choose route automatically for a transaction. the format transition module completes the transition between various messages

    適配器模塊使中間業務平臺能很容易連接外部系統,或特定;智能交換路由模塊能根據用戶設置路由腳本,靈活地進行報文路徑選擇;進行標適配器定位,控制報文信息流轉。
  19. A series of problems have been dealt with, such as the interfirem trust situation as a whole, whether there is difference in the trust of suppliers with different kind of business or in different phases, the main factors that affect the trust for suppliers and how client trust influence their purchase intention and long - term collaborative intention. the main purpose of this paper is to understand the actuality of interfirm trust of domestic organizations in marketing, to discuss how the customer trust comes into being and the mechanism of customer trust in the development of client relationship development. the paper is aimed to offer some insights into further study of trust theory based on customer relationship and some practical advices for chinese enterprises to build up customer trust

    本文就是基於組織營銷中客戶關系管理視角,站在客戶角度,要研究在中國社會文化背景下組織營銷客戶關系中,前我國客戶信任總體水平如何、處于什麼樣層次、對不同發展階段以及企業性質供應商信任度是否存在差異、影響客戶建立對供應商信任感要因素是什麼、客戶信任是如何影響客戶購買意圖以及長期合作意圖等一系列問題,其研究要是了解前我國組織營銷中客戶信任現狀,探討客戶對供應商信任感形成制以及客戶信任在客戶關系發展中作用制,從而為我國以後進一步研究基於客戶關系信任理論提供一些有益借鑒和對中國企業如何建立客戶信任提出一些有益策略性建議。
  20. The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor - quality intrusion detection tool may not notice

    這種攻擊想法是找出特定上打開埠,但完成方式非常狡猾,因此被攻擊或質量低劣入侵檢測工具不會發現。
分享友人