说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> CC攻击
1)  CC attack
CC攻击
1.
Combining with the work experiment,this paper discusses the method of defense against CC attack in library website.
介绍了CC攻击的原理,并结合图书馆网上服务的特点,探讨了图书馆网站防御CC攻击的方法。
2.
At first, the paper introduces the basis, action and character of CC attack,then summarizes three traditional ways based on code optimization of Website of detect this attack action, and raises two new detection methods based on carrier network.
本文介绍了目前互联网上比较流行的应用层DDoS攻击——CC攻击的基本原理、攻击方式、攻击特征,总结了3种传统的基于网站代码优化的检测方式,并提出了两种基于运营商网络的CC攻击检测方法。
3.
The article focuses on the principles of CC attack and the automatic alarmer design and implementation based on the PHP to CC attack.
讨论了CC攻击的原理以及针对CC攻击基于PHP报警器的设计与实现。
2)  Aggression [英][ə'ɡreʃn]  [美][ə'grɛʃən]
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
3)  Attack [英][ə'tæk]  [美][ə'tæk]
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
4)  attacking [英][ə'tæk]  [美][ə'tæk]
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
5)  attacks [英][ə'tæk]  [美][ə'tæk]
攻击
1.
Attacks and Counterattacks of Digital Watermarking;
数字水印技术的攻击与反攻击研究
2.
Attacks on Robustness of Digital Watermarking and the Responding Remedies;
数字水印稳健性攻击及相应策略
3.
Discussion on ARP Loopholes and Defense ARP Attacks
ARP漏洞及其ARP攻击防范
6)  assault [英][ə'sɔ:lt]  [美][ə'sɔlt]
攻击
1.
Research of Framework Model and Assault Methods of Image Digital Watermark System;
图像数字水印系统的框架模型及攻击方法研究
2.
Moreover,a seckrity policy and a security mode for preventing assault from inside of intranet are obtained through the analysis of the framework principle.
文章描述了IPSec协议和IPSec的结构 ,通过对于此结构上的理论分析 ,获得了一种对于防止来自企业网络内部攻击的安全策略和安全模式 ,并提出了基于此模式下的对于本地网络安全的实施和管理方
补充资料:5-Phenyl-2-cc-naphthyl-oxazol
CAS:846-63-9
分子式:C19H13NO
分子质量:271.31
熔点:104-106℃
中文名称:2-(1-萘基)-5-苯基恶唑

英文名称:2-(1-naphthalenyl)-5-phenyl-Oxazole
2-(1-Naphthyl)-5-phenyloxazole
2-(1-naphthalenyl)-5-phenyl-oxazol
alpha-npo
5-Phenyl-2-cc-naphthyl-oxazol
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条