助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   主机信息 的翻译结果: 查询用时:0.734秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

主机信息
相关语句
  host information
     The mechanism of wrapping information stream into service data in grid system based on the idea of grid service was analysed. A concrete application of wrapping cluster host information into service data was given.
     以面向服务的思想,分析了网格系统中信息流到服务数据封装的运行机制,并给出了一个完成集群系统中主机信息到服务数据封装的具体应用。
短句来源
  host-information
     Aims at analyzing and regrouping the SMB packets captured in LAN for data-information transmission,so as to get the key-information,such as file-information, host-information, and to realize getting the information of accessing operation of the hosts in LAN into the log.
     通过对局域网内所截取的用于数据信息传输的SMB数据包进行分析及重组的方案,从而得到在局域网中传输的关键信息,诸如文件数据、网内主机信息等,并实现了对LAN中的一些主机访问操作进行日志记录。
短句来源
  “主机信息”译为未确定词的双语例句
     Design and Implement of Information Monitoring System of Virtual Host Based on Linux
     基于Linux的虚拟主机信息监控系统的设计与实现
短句来源
     The Design and Implementation of Client/Server-Based Host Computer Information Monitor System
     基于C/S架构的主机信息监控系统的设计与实现
短句来源
     The paper briefly discusses the issues of configuration file of DHCP Server and three different ways to provide IP address for Client of DHCP Server and explains the normal procedure by which DHCP Serve and clients exchange information in dynamical configuration of IP addresses.
     本文概述了DHCP服务器的配置文件项和为客户机提供IP地址的三种不同方式,详细说明了动态配置方式中DHCP服务器与客户主机信息交互的一般过程。
短句来源
     How to effeciently protect host computer resource and information needs not only perfection of traditional security protecting technology but also application of a kind of new security technology which is the Intrusion Detection system.
     如何有效保护主机资源不被破坏和主机信息安全不仅需要加强传统的安全防护体系和策略,更须引入新一代的安全防护体系------入侵检测系统。
短句来源
     Based on the study of the theory of Mixed Intrusion, this thesis has given out the system architecture and functional framework of MIDS, and introduced the theory, design and some algorithms of several key modules in detail.
     论文在研究混合型入侵检测理论的基础上,给出了混合型入侵检测系统的系统构架和功能结构,并详细介绍了几个关键模块的理论、设计和部分算法,联合分析模块根据信息融合理论采用可信度方法分析,通过已有专家知识,建立联合分析规则库,解析网络数据和主机信息特征。
短句来源
更多       
  相似匹配句对
     Information collection and using;
     信息
短句来源
     information and benefit.
     信息
短句来源
     Research on Representative Information Source of Intrusion Detection System Based on Host
     基于主机的入侵检测系统的典型信息源研究
短句来源
     Use of host's software information to mitigate false positive in signature-based NIDS
     利用主机软件信息消除NIDS虚警
短句来源
查询“主机信息”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  information of host
Host location behavior is effected unimodally with chemically mediated information of host orgin.
      
  host information
aethiops populations, in which infection levels ranged from 0 to 29.2%, and attempted species assignation based on host information, restriction fragment length polymorphism (RFLP) analysis and morphology.
      
Host information allowed reliable separation of species a and b from species c.
      
Amongst this group of digeneans, host information + RFLP provide a rapid, unambiguous method of species assignation that host information + morphological measurements cannot.
      
For nearly a century, incorrect morphological, biological, life-cycle and host information has been attributed to E.
      
A Java GUI can be used to interact with remote sensors and actuators, and to present frequently measured host information.
      
更多          


This paper puts forward a monitoring system model based on portable interceptors for CORBA-based distributed applications. The model employs portable interceptors to intercept communication messages between distributed objects. Furthermore the model employs the event service to dispatch intercepted messages asynchronously. The model has a low requirement on run-time environments and good portability, and has less impact on the influence of the monitored system, and is suitable for any ORB platform complied with...

This paper puts forward a monitoring system model based on portable interceptors for CORBA-based distributed applications. The model employs portable interceptors to intercept communication messages between distributed objects. Furthermore the model employs the event service to dispatch intercepted messages asynchronously. The model has a low requirement on run-time environments and good portability, and has less impact on the influence of the monitored system, and is suitable for any ORB platform complied with CORBA specifications.

本文给出了一种基于可移植拦截器的CORBA监控系统模型。该模型使用可移植拦截器截获基于CORBA的分布式对象之间的通信信息和主机信息 ,并利用事件服务异步地发送监控信息。该模型对运行环境要求低 ,可移植性好 ,对被监控系统的性能影响较小 ,可以适用于任何遵守CORBA规范的ORB平台。

Aims at analyzing and regrouping the SMB packets captured in LAN for data-information transmission,so as to get the key-information,such as file-information, host-information, and to realize getting the information of accessing operation of the hosts in LAN into the log.The implementation of this project depends on the analysis on the pertinence between the SMB packets,and the processing such as regrouping base on it.This project can finally get the information in LAN snugly, and begin farther attack by cooperating...

Aims at analyzing and regrouping the SMB packets captured in LAN for data-information transmission,so as to get the key-information,such as file-information, host-information, and to realize getting the information of accessing operation of the hosts in LAN into the log.The implementation of this project depends on the analysis on the pertinence between the SMB packets,and the processing such as regrouping base on it.This project can finally get the information in LAN snugly, and begin farther attack by cooperating with remote attack.The practice of this project is based on the Windows 2000 Professional,and the rationale is fit in with other NOS.

通过对局域网内所截取的用于数据信息传输的SMB数据包进行分析及重组的方案,从而得到在局域网中传输的关键信息,诸如文件数据、网内主机信息等,并实现了对LAN中的一些主机访问操作进行日志记录。本方案的实现主要通过分析数据包之间的相关性来进行数据的重组等处理,最终实现了对局域网的隐蔽的信息窃取,并可以和远程攻击相结合进行更深入的攻击。此方案实现网络环境为Windows2000Professional建立的局域网,但实现的基本原理是适用于其它NOS建立的局域网。

TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up. The information leakage problems are discussed in detail. The information eavesdropping caused by TEMPEST ATTACK from computer display units, peripherals host computer, and computer virus are investigated. Finally, some countermeasures are introduced against the TEMPEST ATTACK.

针对 TEMPEST ATTACK对计算机信息安全构成的威胁 ,建立了基本的电磁辐射模型 .详细讨论了TEMPEST ATTACK对计算机显示单元、外部设备和主机的信息窃取以及利用 TEMPEST ATTACK计算机病毒窃取信息 .最后介绍了防止 TEMPEST ATTACK的对策

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关主机信息的内容
在知识搜索中查有关主机信息的内容
在数字搜索中查有关主机信息的内容
在概念知识元中查有关主机信息的内容
在学术趋势中查有关主机信息的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社