网络攻防与实践翻译成英语_网络攻防与实践翻译

hacker|
199

黑客攻防入门与进阶用英语怎么说

黑客攻防入门与进阶_有道翻译

翻译结果:

The hacker attack and defense introductory and advanced

advanced

英 [ədˈvɑ:nst]

美 [əd'vænst]

adj. 先进的;高级的;晚期的;年老的

v. 前进;增加;上涨(advance的过去式和过去分词形式)

advanced 高级,先进,高级设置

Advanced Materials 先进材料,先进材料,高级材料

诸葛建伟的原创翻译书籍

1. 诸葛建伟编著.网络攻防技术与实践,电子工业出版社,2011年6月。获全国密码学网络信息安全类优秀教材一等奖。

2. 诸葛建伟,陈力波,孙松柏等著.Metasploit渗透测试魔鬼训练营,机械工业出版社,2013年9月。2013年当当网计算机/网络类新书畅销榜排名第1名。

3. 诸葛建伟,王珩,孙松柏等译著.Metasploit渗透测试指南, 电子工业出版社, 2012年1月. 2012年当当网信息安全类畅销书第3名。

4. 诸葛建伟,陈霖,许伟林等译著.Wireshark数据包分析实战(第2版), 人民邮电出版社, 2013年3月.2013年度China-pub销售榜网络类图书销售第2名。获2013年51CTO最受读者喜爱的引进IT技术图书奖。

5. 诸葛建伟,梁智溢译.线上幽灵:世界头号黑客米特尼克自传,电子工业出版社,2014年1月。

6. 诸葛建伟,姜辉,张光凯译. 恶意代码分析实战,电子工业出版社,2014年4月。

7. 诸葛建伟,肖梓航,杨坤译. 黑客攻防技术宝典:Android篇, 人民邮电出版社图灵公司,预计2015年Q1.

寻求准确翻译

In the Internet vigorous development today, the network security question more and more is valued people's, but the hacker attack is creates the network security problem the primary cause, along with hacker technology development, network attack method diversification, virtually impossible to guard against, the information and the network security question more and more many receives the various countries' government, the scientific research institution widespread attention.The analysis studies the method which the hacker moves and uses the technology, to sharpens the active defense ability, the enhancement network security construction, prevented the network crime has the very good model function, and also has the vital significance in the network security event emergency response research. The network information security is facing the enormous threat and the challenge.The military commander has the word, knows oneself and the other side, is undefeated in many battles, carries on the reasonable appraisal to the network security condition, carries on the full understanding and the perspective research to the network attack behavior is maintains the initiative key in the network attack and defense resistance. The traditional safe protection method firewall, the invasion examination, the security loophole scanned, the hypothesized private network and so on wage the struggle in the same network hacker in the process to play the huge role, but in the network attack which emerged one after another incessantly (unknown attack front these traditional safe defensive measure appears in particular) somewhat lacks the ability to do what one would like, was in the passive region gradually. The present paper from the analysis network origin and the development, to the common operating system loophole and the method of attack, as well as Windows aspects and so on Internet server safe disposition practice, narrated the network attack common way as well as the basic guard measure.

0条大神的评论

发表评论