新核心綜合學(xué)術(shù)英語教程Unit5_第1頁
新核心綜合學(xué)術(shù)英語教程Unit5_第2頁
新核心綜合學(xué)術(shù)英語教程Unit5_第3頁
新核心綜合學(xué)術(shù)英語教程Unit5_第4頁
新核心綜合學(xué)術(shù)英語教程Unit5_第5頁
已閱讀5頁,還剩11頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Language Points1) anti-malicious software (malware) protection: 反惡意軟件(惡意軟件)保護(hù)程序反惡意軟件(惡意軟件)保護(hù)程序2) Structured Query Language (SQL): 結(jié)構(gòu)化查詢結(jié)構(gòu)化查詢語言語言3) Cross-site scripting: 跨站點(diǎn)腳本攻擊跨站點(diǎn)腳本攻擊4) key-loggers: 鍵盤監(jiān)控病毒鍵盤監(jiān)控病毒5) rootkit: 根程序病毒根程序病毒6) bonet: 僵尸網(wǎng)絡(luò)僵尸網(wǎng)絡(luò)7) spam: 垃圾郵件垃圾郵件8) phishing: 網(wǎng)絡(luò)釣魚(用仿冒銀行電子郵件等騙取網(wǎng)絡(luò)

2、釣魚(用仿冒銀行電子郵件等騙取個(gè)人信息以盜取金錢或用于犯罪等)個(gè)人信息以盜取金錢或用于犯罪等)Language Points9) Storm Worm: 風(fēng)暴蠕蟲風(fēng)暴蠕蟲10) software patch: 軟件補(bǔ)丁軟件補(bǔ)丁11) social engineering:社會(huì)工程社會(huì)工程 12) penetration test:滲透測(cè)試滲透測(cè)試13) hacker proof: 防黑客裝置(計(jì)算機(jī))防黑客裝置(計(jì)算機(jī))14) Binary Decision Diagram (BDD) :二元決策圖二元決策圖15) decryption key:密鑰密鑰16) model checking:

3、模型校驗(yàn)?zāi)P托r?yàn)17) theorem proving: 定理證明定理證明Sentence Translation1. Storm successfully evaded and study it). (L34-37, D)2. Social engineering confidential information. (L38-40, E)3. As attackers risks and dangers. (L53-54, F)4. Antivirus software an afterthought. (L59-61, G)5. Combined with software systems

4、. (L86-88, J)6. As the attractive to design it. (L96-98, Para. L) Sentence Translation1. Storm successfully evaded antivirus protection, had a decentralized control structure that made it difficult to shut down, and had a built-in self-defense mechanism (it launched denial of service attacks against

5、 researchers trying to access and study it). (L34-37, Para. D)譯:譯:“風(fēng)暴風(fēng)暴”可成功避開病毒防護(hù)軟件,分散式的可成功避開病毒防護(hù)軟件,分散式的結(jié)構(gòu)使得該程序難以被關(guān)閉,并具有內(nèi)置的自結(jié)構(gòu)使得該程序難以被關(guān)閉,并具有內(nèi)置的自我防御機(jī)制(當(dāng)研究人員試圖進(jìn)入并檢查時(shí),我防御機(jī)制(當(dāng)研究人員試圖進(jìn)入并檢查時(shí),該軟件可自行發(fā)出拒絕服務(wù)攻擊的指令)。該軟件可自行發(fā)出拒絕服務(wù)攻擊的指令)。Language Points2. Social engineering here refers to manipulating a computer us

6、er to take an action with undesired consequences, such as downloading a file containing malware, clicking on a link that takes them to a fraudulent Web site, or divulging confidential information. (L38-40, Para. E)譯:譯:社會(huì)工程在這里是指操縱計(jì)算機(jī)用戶的行動(dòng)社會(huì)工程在這里是指操縱計(jì)算機(jī)用戶的行動(dòng)并導(dǎo)致不良后果,如下載含有惡意軟件的文并導(dǎo)致不良后果,如下載含有惡意軟件的文檔、點(diǎn)擊含有

7、欺詐網(wǎng)頁的鏈接或泄漏機(jī)密信檔、點(diǎn)擊含有欺詐網(wǎng)頁的鏈接或泄漏機(jī)密信息等。息等。Language Points3. As attackers target the “human layer” with social engineering, it will be increasingly important to ensure that users are educated as to current cybersecurity risks and dangers. (Line 53-54, Para. F)譯:譯:因?yàn)樯鐣?huì)工程的攻擊目標(biāo)是因?yàn)樯鐣?huì)工程的攻擊目標(biāo)是“人類層面人類層面”,所以提高用戶

8、對(duì)當(dāng)前網(wǎng)絡(luò)安全隱患的防范所以提高用戶對(duì)當(dāng)前網(wǎng)絡(luò)安全隱患的防范意識(shí)將會(huì)越來越重要。意識(shí)將會(huì)越來越重要。Language Points4. Antivirus software, firewalls, and intrusion detection systems are important and useful technologies, but they are symptomatic of the fact that security is often an afterthought. (Line 59-61, Para. G)譯:譯:雖然殺毒軟件、防火墻和入侵檢測(cè)系統(tǒng)都是重雖然殺毒軟件、防

9、火墻和入侵檢測(cè)系統(tǒng)都是重要而實(shí)用的技術(shù),但它們的問題是安全通常都要而實(shí)用的技術(shù),但它們的問題是安全通常都只是亡羊補(bǔ)牢。只是亡羊補(bǔ)牢。Language Points5. Combined with greater computational power, these sorts of advances, among others, have led to tangible improvements in the ability to produce more fundamentally sound hardware and software systems. (Line 86-88, Para.

10、 J)譯:譯:更加強(qiáng)大的計(jì)算能力及諸如此類的其他方面的更加強(qiáng)大的計(jì)算能力及諸如此類的其他方面的進(jìn)步提升了研發(fā)更為可靠的軟硬件的能力。進(jìn)步提升了研發(fā)更為可靠的軟硬件的能力。Language Points6. As the attractive economics of cloud computing trigger yet another wave of valuable services over the Web, software security will become even more urgent. Perfectly secure software is impossible, b

11、ut that does not mean that we should not try to design it. (L96-98, Para. L)譯:譯:云計(jì)算可觀的經(jīng)濟(jì)效益在互聯(lián)網(wǎng)掀起了又一波云計(jì)算可觀的經(jīng)濟(jì)效益在互聯(lián)網(wǎng)掀起了又一波有價(jià)值的服務(wù)熱潮,軟件安全變得更加重要。有價(jià)值的服務(wù)熱潮,軟件安全變得更加重要。雖然絕對(duì)安全的軟件是不可能的,但這并不意雖然絕對(duì)安全的軟件是不可能的,但這并不意味著我們就應(yīng)該停止嘗試。味著我們就應(yīng)該停止嘗試。1. The idea of ambient activities. (L-3, Para. A)2. In sharing positional ex

12、perience. (L23-24, Para. C) 3. However, a standardized “Plug and Plat” approach. (L58-61, Para. G) 4. As the integration intelligent environments. (L68-71, Para. H)5. This means that being allowed to fall to Earth. (L72-75, Para. H)6. Avoiding the latter situation use of ambient intelligence. (L80-8

13、3, Para. I) Translation Assignment1. The idea of ambient intelligence implies an intrinsic link between individuals and their environment, enabling individuals to access and interact with computing artifacts in ways that are intuitive and do not disrupt everyday activities. (Line 1-3, Para. A)智能環(huán)境是指

14、個(gè)人與環(huán)境之間的某種內(nèi)在聯(lián)系,智能環(huán)境是指?jìng)€(gè)人與環(huán)境之間的某種內(nèi)在聯(lián)系,這種聯(lián)系使個(gè)人與計(jì)算設(shè)備能以一種自然而然、這種聯(lián)系使個(gè)人與計(jì)算設(shè)備能以一種自然而然、不擾生活的方式連接并互動(dòng)。不擾生活的方式連接并互動(dòng)。 Translation Assignment2. In sharing positional and personal information, multimedia content may be personalized and presented via the visitors smart phone, resulting in a more satisfactory experi

15、ence. (Line 23-24, Para. C) 在共享方位與個(gè)人信息的過程中,多媒體信息會(huì)在共享方位與個(gè)人信息的過程中,多媒體信息會(huì)得到個(gè)性化處理,再呈現(xiàn)在參觀者的手機(jī)上,從得到個(gè)性化處理,再呈現(xiàn)在參觀者的手機(jī)上,從而帶給參觀者更為滿意的體驗(yàn)。而帶給參觀者更為滿意的體驗(yàn)。 Translation Assignment3. However, a standardized approach is required to achieve interoperability between such physical sensor networks and the Web itself; in

16、this way, seamless connectivity and usability will be achieved through a “Plug and Plat” approach. (Line 58-61, Para. G)然而,這需要一個(gè)標(biāo)準(zhǔn)化的方法以實(shí)現(xiàn)物理傳感然而,這需要一個(gè)標(biāo)準(zhǔn)化的方法以實(shí)現(xiàn)物理傳感器網(wǎng)絡(luò)與互聯(lián)網(wǎng)之間的相互操作,這樣,通過這器網(wǎng)絡(luò)與互聯(lián)網(wǎng)之間的相互操作,這樣,通過這種種“即插即用即插即用”的方式就能實(shí)現(xiàn)無縫連接和應(yīng)用。的方式就能實(shí)現(xiàn)無縫連接和應(yīng)用。Translation Assignment4. As the integration of low-pow

17、er technologies into conventional consumer devices and ambient intelligence increases, energy harvesting from a variety of environmental sources will play a vital role in maintaining the long-term functioning of ambient intelligent environments. (Line 68-71, Para. H)但隨著低能耗技術(shù)在傳統(tǒng)家用設(shè)備中的應(yīng)用和智但隨著低能耗技術(shù)在傳統(tǒng)家

18、用設(shè)備中的應(yīng)用和智能環(huán)境的擴(kuò)展,從各種環(huán)境來源獲得的能源將在能環(huán)境的擴(kuò)展,從各種環(huán)境來源獲得的能源將在智能環(huán)境的長(zhǎng)期運(yùn)行中起著重要作用。智能環(huán)境的長(zhǎng)期運(yùn)行中起著重要作用。 Translation Assignment5. This means that designers must plan for sustainable decommissioning, in much the same way that satellite engineers design satellites to burn on atmosphere reentry rather than being allowed to fall to Earth. (Line 72-75, Para. H)這就意味著設(shè)計(jì)者必須為可持續(xù)停運(yùn)設(shè)計(jì)方案,這就意味著設(shè)計(jì)者必須為可持續(xù)停運(yùn)設(shè)計(jì)方案,就像衛(wèi)星工程師必須將衛(wèi)星設(shè)計(jì)成在進(jìn)入大氣時(shí)就像衛(wèi)星工程師必須將衛(wèi)星設(shè)計(jì)成在進(jìn)入大氣時(shí)就燃燒,而不是讓衛(wèi)星落入地球一樣。就燃燒,而不是讓衛(wèi)星落入地球一樣。 Translation Assignment6. Avoiding the latter situation demands greater communication between lawyers and

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論