隱訪問 的英文怎麼說

中文拼音 [yǐnfǎngwèn]
隱訪問 英文
implied addressing
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Disallow clients from any access to hidden files

    禁止所有客戶藏文件。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Namespaces implicitly have public access and this is not modifiable

    命名空間式具有公共權,並且這是不可修改的。
  4. Was the difference in implicit default access rules really the motivation

    式默認規則的差異真的是動機所在嗎?
  5. For this reason, unauthorized access to sensitive data is a security risk that you must address

    出於這個原因,對敏感數據的未授權是您必須解決的安全患。
  6. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質控制協議採用了maca協議,它使用rts - cts控制報文握手機制來解決uan中的蔽終端、暴露終端以及功率控制題。
  7. How to : access a variable hidden by a derived class

    如何:被派生類藏的變量
  8. On one side, the firewall lets intranet acl users access permitted resources from the outside internet. on the other side, it protects and hides a cluster of computers from cracking attempts and denial of service from the internet

    一方面,它允許intranet的acl用戶從外部的internet許可的資源,另一方面,它又保護並藏計算機集群避免來自internet的破壞行為和拒絕服務( dos ) 。
  9. If the shadowing element is not accessible from the code referring to it, the reference is resolved to the shadowed element

    如果從引用藏元素的代碼無法該元素,則引用被解析為被藏的元素。
  10. A shadowed element is unavailable from within the derived class that shadows it, except from where the shadowing element is inaccessible

    對于被藏的元素來說,從藏該元素的派生類無法使用它,除非是從不能藏元素的位置進行
  11. Property is accessible only when using a code - behind file

    屬性僅在使用代碼藏文件的情況下可以
  12. During the course of information recommending, the thesis combines content - based filtering with collaborative filtering to find particular information for each user, and it also presents different collaborative filtering strategies. in personalized information retrieval, the thesis takes advantage of the user ' s profile which describes particular user ' s information needs to filter useful information from the retrieval results for particular user and to enhance the accuracy of retrieval

    與以往系統不同,系統無需用戶直接反饋,而是通過其對文檔的頻度、駐留時間及操作行為等來式獲取用戶的評價信息;同時,系統也利用用戶候選興趣特徵向量來記錄和累計用戶潛在的、非主要的興趣的變化過程,精度更高。
  13. Demonstrates how to access a base class variable that is hidden in a derived class

    演示如何在派生類中藏的基類變量。
  14. You consent to ups s use of your personal information, which you may provide in connection with your access to and or use of the systems and information, in accordance with the terms of its privacy policy

    閣下同意ups根據其私權原則的規定,使用因閣下及或使用系統和資料而可能提供的閣下個人資料。
  15. The function is accessed through the virtual function table vtbl, and takes an implicit

    該函數通過虛函數表( vtbl ),並採用
  16. In the first stage, focus group interviews were conducted to corroborate views and identify relevant " privacy " issues from selected sectors of the community, including housing estate residents, mtr and kcr communters, car owners, lan kwai fong visitors and workers, university students, tourists and retail shopkeepers

    調查的第一階段了聚焦小組,以收集社會各階層人士的意見,及找出與私有關的議題。被人士包括屋苑居民、地鐵及九廣鐵路乘客、車主,在蘭桂芳工作的人士及蘭桂芳的遊人、大學生、遊客以及零售店鋪經營者。
  17. We pointed out the features of this infrastructure, analyzed the basis of modern applied software - mvc mode, elaborated the j2ee system infrastructure used by this system, and analyzed the integrated infrastructure system. then from the system ' s real requirement, with the object - oriented method, we used an advanced modeling tool - rose to model the system ' s requirement and logic design, then finally implemented the system design. this system uses powerdesigner to do the data modeling, jbuilder as the development tool, and struts framework to realize the separation of the expressing layer, the logic layer and the data layer

    通過研究和開發寬帶boss ,了解了有關boss的基本概念、模型、發展現狀及發展趨勢;然後分析了現代應用軟體的架構: b s架構,指出了此種架構的特點,並分析了現代應用軟體架構的基礎? ? mvc模式,詳細介紹了本系統所採用的j2ee體系架構,對組成本系統的整體架構體系進行分析;隨后從本系統的實際需求出發,以面向對象的方法,採用先進的建模工具rose對系統的需求及邏輯設計進行建模;最後對系統設計加以實現,本系統用powerdesigner對數據建模,以jbuilder為開發工具,採用struts框架實現表示層、邏輯層及數據層的分離,數據層採用數據持久化技術hibernate ,從而可以數據源的數據api ,簡化開發。
  18. If you select the odbc access property for the hidden view, you can reduce the number of documents to one for each category

    如果為這個藏視圖選擇odbc屬性,那麼可以使每種類別的文檔減少到一個。
  19. Protect worksheet contents, such as cell data, hidden formulas, and hidden rows or columns, to prevent a macro or a chart from accessing sensitive data

    保護工作表內容保護工作表中的單元格數據、藏公式、藏行或列等內容,防止宏或圖表敏感數據。
  20. Cooking channels - from the paper how to cook a covert channel is a set of two python scripts ( cgi and client ) allowing to build a communication channel over http cookies

    顧名思義,這是一種藏通道工具。他提供幾種可行方法來實現允許在已被網路控制系統授權的數據流上創建並建立任意數據流傳輸通道。
分享友人