Examples of using
其他攻击
in Chinese and their translations into English
{-}
Political
Ecclesiastic
Programming
考虑采用边缘计算策略的组织需要尽早了解并解决安全问题,否则就有可能引发数据泄露和其他攻击。
Organizations considering an edge computing strategy need to understand and address the security issues early on, or risk inviting data breaches and other attacks.
孟加拉国政府否认IS在该国有任何存在,而是争辩说JMB的新派系支持该攻击和其他攻击。
The Bangladeshi government denies IS has any presence in the country, arguing instead that a new faction of JMB was behind that and other attacks.
这类泄露的更大的后果经常无法知晓,因为黑客会利用这些数据策划其他攻击。
The more extensive ramification of this type of breach is often unknown, as hackers use this data to orchestrate other attacks.
对在2011年阿布贾悲剧事件和其他攻击事件中伤亡的联合国人员,我仍然深感悲痛。
I remain profoundly saddened by the deaths and injuries of our United Nations personnel in the tragic event in Abuja and in other attacksin 2011.
你缺乏强力攻击DjemSo或其他攻击形式所需的体力她的师父解释说。
You lack the physical strength required for the powerful attacking strikes ofDjem So or the other aggressive forms" her Master explained.
委员会还将继续查清此案与其他攻击案件和与哈里里案之间可能存在的关联。
The Commission will also continue to identify possible links with other attacks and with the Hariri case.
虽然多云确实限制了DDoS攻击的破坏性影响,但它使企业容易受到其他攻击。
While the multi-cloud does limit the debilitating effect of a DDoS attack, it leaves the enterprise vulnerable to other attacks.
释放按钮会触发反转移动,然后可以将其链接到一系列其他攻击中。
Releasing the buttons triggers a reversal move that can then be linked into a chain of other attacks.
ESTA轰炸,这是战争的最有效轰炸,随后至少摧毁了100分日本的城镇其他攻击。
This bombing, which was the most effective bombing raid of the war, was followed by other attacks that destroyed at least 100 Japanese towns.
目前尚不清楚他们用来带出激进组织及其支持者的催泪弹、子弹和其他攻击工具为数有多少。
It is unclear how many tear gas, bullets and other offensive instruments they used to bring out radical groups and their supporters holed up inside.
The researchers also combat other attacks, such as the recording and re-sending of messages, known as replay attacks, by adding a timestamp to the message.
RPKI can be used by the legitimate holders of the resources to control the operation of Internet routing protocols to prevent route hijacking and other attacks.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt