• This paper focused on SDH communication network protection.

    本文研究了SDH通信网的保护问题。

    youdao

  • The principle and technique of high voltage network protection.

    朱声石。高压电网继电保护原理技术

    youdao

  • Built-Refinement of the rules, more intelligent network protection.

    内置细化规则设置,使网络保护更加智能

    youdao

  • Active defense technology is an new hotspot in network protection at the moment.

    主动防御技术目前网络保护热点

    youdao

  • Lateral protection, the power plant network protection measures as shown in figure 5.

    横向防护方面,电厂内部的网络防护措施如图5所示。

    youdao

  • It will be a heavy burden for CPU to achieve network protection only based on software.

    如果软件实现网络安全保护对于处理器来说无疑是一个很沉重负担

    youdao

  • The current network protection methods are ineffective in controlling the hosts of the Intranet.

    现有网络安全防护手段缺乏对内网主机的安全管理。

    youdao

  • The new network protection technique is one of the most popular research directions of optical communications.

    新的保护方式当前通信系统热门研究方向

    youdao

  • Protection-switching time is an important measure for evaluating the performance of a network protection scheme.

    保护切换时间衡量一个网络保护方案性能优劣重要指标之一。

    youdao

  • The X 8500e tested came in a UTM bundle, a package that includes everything needed for comprehensive network protection.

    所测X 8500e来自一个UTM中,该包涵括了全面网络保护所需一切

    youdao

  • Hence, the research on integrated network defense and intrusion detection system is critical to network protection.

    因此研究网络集成防御入侵检测技术网络防御技术有着重要意义。

    youdao

  • Lots of network protection equipment providers adopt the strategy that using CPU combined with ASIC to protect the network.

    越来越多网络安全设备厂商趋向于采用ASIC芯片CPU组合策略

    youdao

  • A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.

    一个全面却又简单易用的网络防护软件可以确保计算机任何黑客侵扰。

    youdao

  • The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.

    接入认证网络各层的防护以及端点保护三个方面软交换提供安全的保障。

    youdao

  • The effect of distributed generation on distribution network protection and calculation of allowed capacity are analyzed in detail.

    文章详细分析分布式发电保护影响准入容量计算

    youdao

  • Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.

    最初执行基准风险分析当前威胁评估基础开发使用网络保护战略

    youdao

  • Network forensic system gives us a new method of network protection, and remedies the shortage of the current network security system.

    智能网络取证网络防护提供了一种新的措施,弥补原有网络安全体系中的不足

    youdao

  • Operational policy constraints are often impacted by the type of appliance doing the policy enforcement or by the overall network protection directives.

    实施策略设施类型总体网络保护指示常常会影响操作策略约束

    youdao

  • Fundamental to risk management is identification of residual risk with a network protection strategy in place and acceptance of that risk by management.

    风险管理基本条件剩余风险识别建立,管理风险,通过验收网络保护策略

    youdao

  • Intelligent network forensic system (INFS) gives us a new method of network protection, and remedies the shortage of the current network security system.

    智能网络取证为网络防护提供了一种新的措施,弥补原有网络安全体系中的不足

    youdao

  • The data throughput achieved by ASIC will become one of the critical targets to weigh the performance of network protection equipment under such strategy.

    这种策略ASIC芯片所能达到数据吞吐率便成了衡量网络安全设备性能关键指标

    youdao

  • Combined with topologies of major telecom operators' transmission networks of long -distance backbone transmission networks in China, it analyzes its network protection solution.

    结合目前我国长途骨干传输网上主要电信运营商传输网络的网络拓扑现状,网络保护方案进行了分析。

    youdao

  • Modern society is increasingly depending on communications, therefore network protection and restoration has become one of the key elements of network construction and maintenance.

    现代社会对于通信依赖性越来越强因此网络保护恢复网络建设和维护的关键之一

    youdao

  • While this protection strategy allows higher network throughput, it does so at the cost of some network security.

    这种保护策略允许更高网络吞吐量代价是牺牲部分网络安全性

    youdao

  • It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.

    务必考虑系统每个层次可能访问路径同时还要考虑授权如何其他安全功能(网络级别保护)集成

    youdao

  • You should consult other sources of information to ensure your system is secure, or run it on a private network that provides a suitable level of protection.

    应当参考其他信息来源确保系统安全或者提供适当保护的内部网络运行

    youdao

  • An operating system's protection ends at the network.

    操作系统保护于网络。

    youdao

  • This provides an added degree of protection by hiding the true IP addresses of the private network from the public network.

    通过公共网络隐藏专用网络实际ip地址增加保护程度

    youdao

  • Lady Sawers put no privacy protection on her Facebook account, allowing any of the site's users in the open-access London network to see the entries.

    Sawers夫人没有Facebook账号设置隐私保护,Facebook上的所有通过伦敦公用网络接入的用户都可以访问她页面。

    youdao

  • Secure Shell (SSH) was intended and designed to afford the greatest protection when remotely accessing another host over the network.

    SecureShell (SSH)的目的在于通过网络远程访问另一个主机提供最大保护

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定