脆弱點 的英文怎麼說

中文拼音 [cuìruòdiǎn]
脆弱點 英文
rothole
  • : 形容詞1 (容易折斷破碎) fragile; brittle 2 (較硬的食物容易弄碎弄裂) crisp 3 (聲音清脆) (of ...
  • : Ⅰ形容詞1 (氣力小; 勢力差) weak; feeble 2 (年幼) young 3 (差; 不如) inferior 4 (接在分數或...
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  1. Finally, the author has conceived to constructs the government responsibility system through changing exterior difficult position into which the populace falls and strengthening the psychological interventions, with a view to the government shoulders its own responsibility based on the populace vulnerability in the process of crisis management, forecasts, unblocks and controls the populace vulnerability properly, enhances the society ’ s duteous effect and reduces the reverse effect, reduces the government ' s changeability and difficulty during the crisis management, makes the crisis management obtain the good effect and the anticipated target

    從不同層面對二者關系進行了論述,並針對危機情境下民眾性的產生根源深入探討危機管理中的政府責任問題。第四部分,以危機情境下民眾性為基構建危機管理中的政府責任制度。提出了政府在危機管理中應樹立何種責任觀念,構建了政府在危機管理中的責任體系,論述了危機管理中政府責任的約束機制。
  2. Formaldehyde - free formula protects nails with antioxidant. vitamin e, emollient - rich kukui nut oil, and sootjing aloe vera

    = =含無甲醛配方,抗氧維他命e ,豐富軟化困仁油,及溫和蘆薈,能保護$及的指甲
  3. According to its cause and characteristics of landuse, we can classify such area into two typical areas : area with soil and water erasion and area with land desert

    根據其成因和西部土地資源利用特,可將西部土地生態區劃分為兩種類型:水土流失嚴重型生態環境區和土地沙漠化型生態環境區。
  4. Hell, son. you ' re about as useful as a cock - flavoured lollipop

    注意,你小子就跟棒棒糖一樣
  5. Maybe you were misquoted. i sort of hope you were misquoted. maybe it was a weak moment. but i read an interview from just a few weeks ago

    可能你引用錯誤。我有希望你是引用錯誤。可能是的一瞬間。我一周前讀過一個采訪。
  6. As a result, vulnerable ecological environment is showed with the ecological bearing capacity in middle reaches of hetian river. in the view of the features of landscape pattern in the middle reaches of hetian river, the landscape protection principles of development, harmonization and reality and ecological landscape construction principle including adapting nature, mutualism, adjusting ecosystem and meliorating function, local regulation and whole " harmonization are put forward

    A ,指出區域內生態環境質量在提高,但依舊無法脫離荒漠生態體系,是一種極其的生態環境。針對和田河中游地區景觀生態的具體特,提出了發展、協調、現實的景觀保護原則以及適應自然、共生互利、調整結構,改善功能、局部控制與整體協調的景觀生態建設原則,相應地制定出河流廊道建設、綠色植被建設以及綠洲建設的景觀生態建設途徑
  7. Throughout them all, giving up her individuality, she would become the general symbol at which the preacher and moralist might point, and in which they might vivify and embody their images of woman s frailty and sinful passion

    她將在長年累月之中,放棄她的個性,面成為佈道師和道學家指指的一般象徵,藉以形象具體地說明女性的與罪孽的情慾。
  8. That banking crisis break out frequently leads people pay more attention to the research of financial fragility. some economists believe that the high debts ratio operation decides the congenital bank failure. this is the narrow sense concept

    高負債經營的特決定了金融具有更容易失敗的本性,這一概念在早期得到廣泛的認同,也就是人們通常所說的狹義上的金融性。
  9. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  10. Three - dimensionally braided structural composites have distinct structure that is fully integrated, continuously spatial fiber - network impregnated with ductile material. the new innovative materials have not plies as conventional composites have, and put an end once and all to low interlaminar strength showing in laminate materials. because of their enhanced stiffness and strength in the thickness direction, near - net - shape design and manufacturing, superior damage tolerance and specified aerospace function, the braided composites are gaining more and more attention of industry and academia

    三維編織結構復合材料是完全整體、連續、多向的紡線(纖維束)的網路,充填以延性材料,這類新材料已失去通常復合材料的層合板概念,由此,層合板復合材料層間的致命在編織結構復合材料中得到克服,所以編織結構復合材料具有高的強度和剛度(包括在厚度方向) ,接近實際形狀的製造,高的沖擊韌性、高的損傷阻抗,和按實際設計要求的特定的航空航天方面的使用功能,因而廣泛地受到工業界和學術界的關注。
  11. An applied case of injection engine was provided to illustrate the feasibility of the proposed model in failure propagation analysis, and to verify the efficiency to find the system crisp nodes which become the proofs for the design improvement and failure prevention

    用該模型對噴射發動機的故障傳播過程進行分析,結果表明,該方法可以有效地找到系統中存在的脆弱點,從而為設計改進和故障預防提供了重要依據。
  12. The close correlation of flowering with large plants might be a vulnerable point in the life cycle of changnienia amoena while facing increasing exploitation by human beings, which could threaten the survival of the species

    面對日益增長的人類採掘風險,獨花蘭開花與大型植株的關聯可能是其生活史中影響種群生存的脆弱點之一。
  13. Honey, it ' s okay to be vulnerable sometimes. lt ' s just me

    寶貝,有時候脆弱點沒什麼的現在這里只有我
  14. It ' s been almost 5 years since the attacks on 9 / 11, and president bush says enormous strides have been made in correcting us security vulnerabilities brought to light that day

    911襲擊事件已經過去五年,布希總統稱那天在發現美國安全脆弱點后,現在他們已經在修整美國安全方面取得了巨大的進展。
  15. We laid special stress on analyzing the secure development of web. to design a secure web system, an secure enhanced model was build, which we called ira model

    接著對web體系結構各環節的脆弱點進行深入分析,介紹可能遭到的攻擊類型和具體方法,並在此基礎上提出了增強安全web系統解決方案。
  16. Because of the tremendous growth of the internet, network and computer security is now recognized as essential, but with changes in technology, inevitably come new threats, vulnerabilities, and increased risk

    由於網際網路的巨大發展,網路和計算機安全現在被公認為是一個要素。然而,科技的改革,帶來了不可避免的新威脅,脆弱點,和增強的風險。
  17. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏洞和脆弱點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和脆弱點分佈等信息,有針性對的選取關鍵設備或者防護較的設備進行攻擊與控制。
  18. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  19. The model mpls and the diff - serv integration is a body. through has introduced special function bb in the model, carries on the management and the monitoring to the vpn current capacity and in model foundation, has constructed based on the discrimination service restraint route algorithm, carries on the graduation and the classified management to the vpn current capacity then, this article discussed the mpls vpn way to protect and to restore the mechanism. in view of the vulnerable point which its exists has made the improvement. finally, this article

    模型將mpls與diff - serv集成為一體,通過在模型中引入了一個特殊功能的帶寬代理bb ,對vpn流量進行策略管理和監控。在模型基礎,構建了一個基於區分服務的約束路由演算法,對vpn流量進行分級和分類管理。接著,本文探討了mplsvpn的路徑保護與恢復機制,針對其所存在的脆弱點進行了改進。
  20. Upon completion of the course, participants will have an initial understanding of the increasing vulnerabilities and risks threatening today ' s network environments, state - of - the - art technologies that can help to protect the network against those threats, and cutting - edge techniques that can be used to secure network communications

    課程完成後,參加者將初步了解威脅今日網路環境的漸增的脆弱點和風險,能幫助您保護網路于那些威脅的科技,以及能防護網路通訊的頂尖技術。
分享友人