期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
基于Shadow Defender的高校电子阅览室系统安全架构 被引量:1
1
作者 张曾昱 孙睿阳 《图书馆学研究》 CSSCI 北大核心 2009年第2期35-36,98,共3页
介绍了Shadow Defender在维护电子阅览室计算机系统方面的优势,以及Shadow Defender的使用方法。
关键词 SHADOW defender高校电子阅览室 影子系统 系统维护
下载PDF
基于Shadow Defender的高校电子阅览室安全体系研究
2
作者 刘美珍 《职业时空》 2013年第1期121-124,共4页
论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面&... 论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面"系统状态"、"模式设置"、"排除列表"、"立即储存"以及"管理配置"的主要功能。 展开更多
关键词 SHADOW defender 高校电子阅览室 影子系统 系统维护
下载PDF
浅谈路虎Defender2020款最新品牌精神及技术亮点
3
作者 韩荧 郭紫威 《内燃机与配件》 2021年第6期38-39,共2页
路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也... 路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也彰显了路虎的品牌精神。本文将分析Defender2020款最新品牌精神和Defender2020款最新的技术亮点和创新点。 展开更多
关键词 路虎defender 品牌精神 技术亮点
下载PDF
IBM硬盘的保护神——Smart Defender
4
作者 石笋 《软件》 2002年第4期53-53,共1页
蓝色巨人IBM一向给人稳重可靠,值得信赖的印象,可是前些日子它的腾龙二代和腾龙三代玻璃硬盘的质量问题确实闹得满城风雨.
关键词 硬盘安全检测工具 IBM硬盘 SMART defender
下载PDF
原始之美 全新2007款路虎Defender
5
作者 赵迪 《车时代》 2007年第2期32-35,共4页
Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置... Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置似乎显得有些过时,但正是这种纯粹的机械之感使Defender散发着最为诱人的原始之美! 展开更多
关键词 越野性 2007款 路虎defender 底盘 轴距 动力性 灵敏性
下载PDF
强身健体——给Shadow Defender吃味补药
6
作者 丁小光 《电脑知识与技术(经验技巧)》 2009年第6X期26-26,共1页
Shadow Defender(影子卫士)是一款小巧却功能强大的系统防护软件,程序不仅支持自定义多分区保护,程序自身还能有效预防机器狗病毒,和Powershadow(影子系统)齐驱并驾(图1)。
关键词 注册表编辑器 安全模式 软件 Shadow defender
下载PDF
保健品Mega Defends X致急性肝损伤1例
7
作者 张毛 贾胜男 +2 位作者 张传辉 张倩 金珍婧 《中南药学》 CAS 2021年第2期367-368,共2页
1病例介绍患者,女,55岁,因“尿色加深10 d,目黄1周”于2020年3月4日就诊于本院。该患者于20 d前自行口服“Mega Defends X(MDX)”保健品,1粒/次,qd po。10 d前出现尿色加深及目黄,伴皮肤瘙痒。
关键词 Mega defends X 保健品 黄芩 肝损伤 不良反应
下载PDF
AN APPROACH OF DEFENDING AGAINST DDOS ATTACK 被引量:1
8
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第1期148-153,共6页
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to pro... An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200. 展开更多
关键词 Distributed Denial of Service (DDoS) defendING Flow model Flow detection IXP1200 Dfighter
下载PDF
Defending the Frontier
9
作者 Hou Weili 《ChinAfrica》 2017年第12期14-16,共3页
LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was... LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was the biggest hurdle, but the difficulty in effectively delivering the treatment drugs and services. 展开更多
关键词 HIV defending the Frontier
下载PDF
Misinterpreted Figure in Hemingway’s“Indian Camp”-Doctor Adams
10
作者 HUANG Li-hua 《Journal of Literature and Art Studies》 2023年第10期780-784,共5页
Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulou... Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulous and strenuous close reading together with extensive reviewing and analyzing of relevant references,the author of this paper finds that Uncle George has always been misinterpreted over the time.This paper aims to point out the misunderstanding,misinterpretation or even distortion in the previous researches,in an attempt to defend for Doctor Adams and put the record straight. 展开更多
关键词 HEMINGWAY “Indian Camp” Doctor Adams misinterpreted defend
下载PDF
基于双软件层面的电子阅览室系统安全架构
11
作者 张曾昱 于秀芬 《中华医学图书情报杂志》 CAS 2009年第2期70-71,共2页
介绍了Shadow Defender与AntiArpSniffer结合在维护电子阅览室计算机系统方面的优势及各自的使用方法。
关键词 SHADOW defender AntiArpSniffer 电子阅览室 计算机安全 网络安全
下载PDF
服务器隐藏用户的建立与查看
12
作者 陈晨 《长江大学学报(自科版)(上旬)》 CAS 2012年第5期145-146,共2页
通过操作注册表以及工具Hacker Defender可在服务器中建立一个隐藏用户,管理员无法通过命令"net user"或计算机管理对话框中的"本地用户和组"或注册表来查看,借助工具XueTr便可查看服务器中的隐藏用户。
关键词 隐藏用户 建立 查看 HACKER defender XueTr
下载PDF
IDS面临的核心问题
13
作者 林平 《中国计算机用户》 2003年第44期34-34,共1页
当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前... 当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前,有必要谈谈IDS和IPS之间的关系,IDS和IPS在入侵检测技术方面是一样的,因此他们面临的问题也是一样的。 展开更多
关键词 IDS 入侵检测技术 安氏互联网安全系统公司 “Linktrust NETWORK defender”
下载PDF
Open-loop solution of a defender–attacker–target game:penalty function approach
14
作者 Vladimir Turetsky Valery Y.Glizer 《Journal of Control and Decision》 EI 2019年第3期166-190,共25页
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu... A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders. 展开更多
关键词 defender–attacker–target problem pursuit-evasion differential game zero-sum linear-quadratic game terminal state inequality constraint
原文传递
Active ear defender design and its principle
15
作者 TIAN Jing SHA Jiazheng LI Ningrong(Institute of Acoustics, Nanjing University) 《Chinese Journal of Acoustics》 1990年第4期326-332,共7页
In this paper the basic principle and the problems meriting attention in the design and application of active ear defenders are discussed quantitatively. A feasible structure and its experimental results are given. It... In this paper the basic principle and the problems meriting attention in the design and application of active ear defenders are discussed quantitatively. A feasible structure and its experimental results are given. It is illustrated that the chief significance of ' active ' is to change the mechanical impedance of the ear defender accordingly, and because of this mechanism, the noise attenuation effectiveness in the low frequency range is improved. 展开更多
关键词 Active ear defender design and its principle
原文传递
打击“流氓”软件
16
作者 孤舟 《网管员世界》 2007年第17期107-110,共4页
流氓软件肆虐,我们该如何应对?面对众多的查删软件,我们该选择谁?本期为您介绍一组简单实用的查删流氓软件工具。
关键词 流氓软件 查删软件 WINDOWS defender Upiea 超级兔子
下载PDF
狂野路虎Land Rover Defender DCl00 Sport
17
《数字时代》 2012年第3期33-39,共7页
它是什么?这是一辆路虎Defender。真的吗?老款的Defender不是一个矿老板暴发户用来炫富的全属大盒子DS?新款Defender可不是这样的。虽然依旧霸道,却多了不少风情。
关键词 越野汽车 品牌 款式 路虎defender
原文传递
Defending Home 被引量:2
18
作者 LI LI 《Beijing Review》 2010年第1期24-25,共2页
A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two f... A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two families violently fighting lawenforcement officials who were evicting them from their homes. 展开更多
关键词 defending Home
原文传递
Methods and Effectiveness of the Training of "Defending the Many with the Few" in Basketball
19
作者 MA Zhenhong 《北京体育大学学报》 CSSCI 1995年第S2期82-82,共1页
Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and f... Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and four -on-five and intensified training, players could impove themselves in a short period in collective abilitys and consciousness, such as choosing position, adjusting position, coordinating defence and shifting defence. And team ability and style could thus be trained. 展开更多
关键词 TRAINING method of "defending the MANY with the few" EFFECTIVENESS coordinating DEFENCE shifting DEFENCE consciousness ability
原文传递
Attacks to Defend Hegemony
20
作者 HU SHAOCONG 《Beijing Review》 2011年第14期10-11,共2页
Despite military strikes against Libya,Western powers are hard pressed to sustain dominance in the Middle
关键词 Attacks to defend Hegemony
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部