防禦性攻擊 的英文怎麼說

中文拼音 [fángxìnggōng]
防禦性攻擊 英文
defensive aggression
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 防禦性 : defensive (weapons)
  • 防禦 : defense
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. An aggressive species of west african mantis in defensive stance, with " eyespots " on forelimbs that suggest she is much bigger than she is

    頗具的西印度螳螂正擺出一副姿勢,兩支前臂放在眼睛旁邊,好像在暗示對手它其實比自己看起來更強大。
  2. For flexibility of command the important task is to make changes such as from the offensive to the defensive or from the defensive to the offensive, from advance to retreat or from retreat to advance, from containment to assault or from assault to containment, from encirclement to outflanking or from outflanking to encirclement, and to make such changes properly and in good time according to the circumstances of the troops and terrain on both sides

    變為變為,前進變為後退,後退變為前進,鉗制隊變為突隊,突隊變為鉗制隊,以及包圍迂迴等等之互相變換,依據敵我部隊、敵我地形的情況,及時地恰當地給以變換,是靈活的指揮之重要任務。
  3. The spell actually defends against ranged attacks, turning aside arrow and bolt

    這個技能實際上能范圍,還以冰彈。
  4. Aim will be to utilize your forces variety to appropriately counter enemy attacks. use predators and zone troopers to deal with enemy armor and to somewhat soak up hits

    目標是利用你的部隊多樣恰當的的抗敵人的進。使用捕食者和區域兵來對付敵人的裝甲部隊,同時吸收
  5. We shall therefore successively discuss the following problems : man ' s dynamic role in war, war and politics, political mobilization for the war of resistance, the object of war, offence within defence, quick decisions within a protracted war, exterior lines within interior lines, initiative, flexibility, planning, mobile warfare, guerrilla warfare, positional warfare, war of annihilation, war of attrition, the possibilities of exploiting the enemy ' s mistakes, the question of decisive engagements in the anti - japanese war, and the army and the people as the foundation of victory

    為了這個,我們將依次說明下列的問題:能動在戰爭中,戰爭和政治,抗戰的政治動員,戰爭的目的,中的進,持久中的速決,內線中的外線,主動,靈活,計劃,運動戰,游戰,陣地戰,殲滅戰,消耗戰,乘敵之隙的可能,抗日戰爭的決戰問題,兵民是勝利之本。
  6. Civilian ships will have an average to high maneuverability, average offense / defense, an average amount of cargo space and average maintenance / crew

    民船會有介於中高水平的可操作,一般的力/一般的力,一般容量的貨艙、一般水平的維護費用以及一般數量的乘員。
  7. At the same time, it includes " mobile defence ", which is conducted when necessary to facilitate such offensive battles ; it also includes positional attack and positional defence in a supplementary role

    同時,也把為了便利於執行這種進戰而在某些必要時機執行著的所謂「運動」包括在內,並且也把起輔助作用的陣地和陣地包括在內。
  8. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務威脅以及研究現狀進行分析描述;然後,從拒絕服務的方法分類、主要手段、常見的範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務進行有效過濾的方法,並用這種方法在linux內核中實現了一個高速過濾器,最後進行了相關的能測試。
  9. Explicit authorization ( briefly ea ) mechanism has many excellent security properties and is capable of preventing information stealing and destroying attack

    顯式授權機制具備很好的安全質,能有效地信息竊取和破壞
  10. In the research counterplan of hacker ' s attack, i carefully analyse the whole process of attack, so i study out the countermeasure

    在研究黑客的安全問題時,以一個黑客監控網路的全過程仔細分析研究了黑客手段,這樣就研究出具有針對對策。
  11. The attacker adds the ability modifier to his roll to set the defender ' s will save dc against the attack

    者在設置者對抗該的意志豁免dc時,將自己的該屬調整值加入。
  12. Upgrade hr - v, your robot companion, with armor, weapons and special equipment. command hr - v to perform offensive and defensive tactical combat maneuvers, or combine your efforts and unleash special attack combos

    玩家要對你自己的游戲搭檔? ? hr - v :一名身穿盔甲、攜帶武器和特殊裝備的機器人進行各種屬的升級。命令hr - v使用帶有進的戰鬥技巧,或者憑借你自身的努力來給予強有力的特殊
  13. Professor sung said studies had shown that patients passed through a viral replicative phase, when the sars virus multiplied rapidly in the body, an immune hyperactive phase, when the body s defences attacked the virus, and a pulmonary - destructive phase, when the lungs were severely damaged and patients needed extra help

    沈祖堯教授指研究顯示,患者會首先經過病毒繁殖期,即在這段時期嚴重急呼吸系統綜合癥病毒在體內大量繁殖;繼而進入免疫系統異常活躍期,即身體的系統病毒;及后為肺部破壞期,此時患者肺部遭受嚴重損傷及需要額外支援。
  14. Most of the existing network information security technologies focus primarily on the defensive response to external attacks, and give less consideration on management of the active network accessing behavior from local users

    現有的網路信息安全技術大多將主要精力集中在對外來進行響應上,而對規范網內用戶的主動訪問行為考慮的較少。
  15. Having to draw and deploy the defensive weapon under direct physical attack leaves everyone with a more realistic perspective on how to carry it, how to practice with it and what can go wrong when you use it

    不用抽獎和部署武器進行直接的身體葉片大家一個更為現實的角度,就如何貫徹,如何在實踐中有什麼可以出錯,當您使用它
  16. Usually, the order of attack styles is accurate, aggressive, controlled, and defensive

    通常,命令風格是準確、侵略,控制和
  17. A successful attack deals temporary ability damage against a specific ability score of the defender

    成功的者相應的屬值造成暫時屬傷害。
  18. Make sure you at least match the power level with your shields and beams or you may be under powered when under attack and will not be able to use your full beam strength or maintain shields under attack

    請確保你的光束(武器)和裝置至少與功率水平相匹配,否則,在受到時,你的船隻可能會動力不足,無法使用完全的光束力量或無法維持
  19. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全問題基礎上,針對isakmpsa協商中的變換載荷做出改進,並進行形式化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特,為彌補火墻靜態的不足,設計出兩者聯動的方法,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef火墻實現模式的理論研究及模擬實驗,所得三部分研究結論均可設計出module ,內嵌入火墻系統中,為國內火墻產品的設計提供了一定的理論基礎。
  20. Whether a big gun is an offensive or a defensive weapon is a difficult question ; it depends on whether you ' re behind it or in front of it

    大炮是還是是個困難的問題,端看你是在它後面還是前面。
分享友人