助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   防火墙 的翻译结果: 查询用时:19.018秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
电信技术
自动化技术
电力工业
金融
建筑科学与工程
图书情报与数字图书馆
计算机硬件技术
更多类别查询

图标索引 历史查询
 

防火墙    
相关语句
  firewall
    Study on Dynamic Access Control in Hierarchical Firewall System
    分级防火墙系统中动态访问控制技术研究
短句来源
    Research on Firewall System with Tunnel Proxy Based on Enhanced Layer Two Tunneling Protocol
    基于增强型第二层隧道协议的隧道代理防火墙系统的研究
短句来源
    Internet Firewall Security
    Internet防火墙安全
短句来源
    Internet Security and Firewall Techniques:Overview and Analysis
    Internet安全和防火墙技术:现状与分析
短句来源
    Especially in the VPN(Virtual Private Network)topology, because of the VPN’s tunneling, private routing and cipher technology, there are two embarrassments for the protection of the internal network. One is the internal services could be uncovered in the internet by the VPN’s tunneling, the other is firewall and IDS(Intrusion Detection System)could not completely analyze the network packet content because of the VPN’s private routing and cipher technology.
    尤其在虚拟私有网络(VPN:Virtual Private Network)拓扑中,由于VPN的隧道技术、私有路由技术和加密技术,一方面使得内部服务群暴露在Internet中,另一方面增加防火墙和入侵检测系统(IDS:Intrusion Detection System)保护内部网络的难度。
短句来源
更多       
  fire wall
    Safety of Computer Network System and Fire Wall
    计算机网络系统的安全与防火墙
短句来源
    CTUNET Security Management and Fire Wall
    CTUNET安全管理与防火墙
短句来源
    THE SECURITY PROBLEMS OF INTERNET AND THE FIRE WALL TECHNOLOGY
    Internet的安全问题与防火墙技术
短句来源
    Visual Input and Translation of Linux Fire wall Rule
    Linux防火墙规则的可视化输入与翻译
短句来源
    DESIGN AND REALIZATION OF INTRANET FIRE WALL SYSTEM
    Intranet防火墙系统的设计与实现
短句来源
更多       
  firewall
    Study on Dynamic Access Control in Hierarchical Firewall System
    分级防火墙系统中动态访问控制技术研究
短句来源
    Research on Firewall System with Tunnel Proxy Based on Enhanced Layer Two Tunneling Protocol
    基于增强型第二层隧道协议的隧道代理防火墙系统的研究
短句来源
    Internet Firewall Security
    Internet防火墙安全
短句来源
    Internet Security and Firewall Techniques:Overview and Analysis
    Internet安全和防火墙技术:现状与分析
短句来源
    Especially in the VPN(Virtual Private Network)topology, because of the VPN’s tunneling, private routing and cipher technology, there are two embarrassments for the protection of the internal network. One is the internal services could be uncovered in the internet by the VPN’s tunneling, the other is firewall and IDS(Intrusion Detection System)could not completely analyze the network packet content because of the VPN’s private routing and cipher technology.
    尤其在虚拟私有网络(VPN:Virtual Private Network)拓扑中,由于VPN的隧道技术、私有路由技术和加密技术,一方面使得内部服务群暴露在Internet中,另一方面增加防火墙和入侵检测系统(IDS:Intrusion Detection System)保护内部网络的难度。
短句来源
更多       
  firewall
    Study on Dynamic Access Control in Hierarchical Firewall System
    分级防火墙系统中动态访问控制技术研究
短句来源
    Research on Firewall System with Tunnel Proxy Based on Enhanced Layer Two Tunneling Protocol
    基于增强型第二层隧道协议的隧道代理防火墙系统的研究
短句来源
    Internet Firewall Security
    Internet防火墙安全
短句来源
    Internet Security and Firewall Techniques:Overview and Analysis
    Internet安全和防火墙技术:现状与分析
短句来源
    Especially in the VPN(Virtual Private Network)topology, because of the VPN’s tunneling, private routing and cipher technology, there are two embarrassments for the protection of the internal network. One is the internal services could be uncovered in the internet by the VPN’s tunneling, the other is firewall and IDS(Intrusion Detection System)could not completely analyze the network packet content because of the VPN’s private routing and cipher technology.
    尤其在虚拟私有网络(VPN:Virtual Private Network)拓扑中,由于VPN的隧道技术、私有路由技术和加密技术,一方面使得内部服务群暴露在Internet中,另一方面增加防火墙和入侵检测系统(IDS:Intrusion Detection System)保护内部网络的难度。
短句来源
更多       

 

查询“防火墙”译词为其他词的双语例句

 

查询“防火墙”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  firewall
Different from traditional run time security strategies such as IDS and firewall, this paper focuses on the solution at the outset; it presents a method to find vulnerabilities by analyzing the source codes.
      
As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products.
      
die Anbindung über einen NAT-f?higen Router, die Nutzung einer Firewall sowie die strikte Trennung der Trennung von Administratoren-und Nutzerfunktionen.
      
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing, layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection.
      
In order to cope with new application types like multimedia, new firewall architectures are necessary.
      
更多          


点击这里查询相关文摘
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关防火墙的内容
在知识搜索中查有关防火墙的内容
在数字搜索中查有关防火墙的内容
在概念知识元中查有关防火墙的内容
在学术趋势中查有关防火墙的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社