计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15

上传人:E**** 文档编号:89190411 上传时间:2019-05-21 格式:PPT 页数:20 大小:355KB
返回 下载 相关 举报
计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15_第1页
第1页 / 共20页
计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15_第2页
第2页 / 共20页
计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15_第3页
第3页 / 共20页
计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15_第4页
第4页 / 共20页
计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15_第5页
第5页 / 共20页
点击查看更多>>
资源描述

《计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15》由会员分享,可在线阅读,更多相关《计算机专业英语 教学课件 ppt 作者 霍宏涛 Chapter15(20页珍藏版)》请在金锄头文库上搜索。

1、Professional English in Computer Field,Chapter Fifteen The Future of Information Technology,内容,正文 Automated Intrusion Response Native XML Databases 阅读材料 3G Technology Voice over IP,1 Automated Intrusion Response,1. Enhancing and Automating the Intrusion Response Process,1 Automated Intrusion Respons

2、e,2. Establishing the Context of an Incident 3. A Framework for Automated Response,Key Words,highlight v. 突出 malware n. 恶意软件 feasibility n. 可行性,可能性 intrusion detection system 入侵检测系统 tackle v. 处理 obsolescence n. 过时 intrusion prevention system 入侵防护系统,Key Words,sidestep v. 回避 false-positive n.误判率 wary

3、adj.机警的,小心的 subvert v. 推翻 confidentiality n. 机密性 perpetrator n. 犯罪者 proof-of-concept n. 概念验证,Notes,Indeed, more recent years have witnessed an apparent shift in the popularity of the associated security products, with intrusion prevention systems (IPS) gaining increasing appeal over IDS solutions. 的

4、确,近些年安全产品的流行已经有了明显的转移,入侵防护系统比入侵检测系统更具有吸引力。 One approach is to concentrate on informing decisions as much as possible, and enabling a responder to issue actions that investigate attacks, collect more evidence, or postpone or delay the attack while investigating, limiting the effects of an attack or a

5、 response at the target. 一种方法是将精力尽可能的集中在信息决策,并且使防御者采取攻击调查、证据收集、或者在调查的时候推迟或延误攻击等行动,这样就可以减少攻击的影响或者目标的反映。,Notes,However, given that the detection methods in many of todays commercial IDS approaches have their origins in research activities dating back to the 1980s, it is relevant to consider how curren

6、t research may help to advance commercial incarnations in the future. 然而目前商业化入侵检测系统的检测方法的研究活动可以追溯到八十年代,所以可以考虑当前的研究如何在未来可以帮助提高商业化的产品。 If the attack is being conducted through the suspected compromise of a user account, what privileges are associated with that account? 如果攻击通过一个可能有潜在危险的账户进行,这个账户的权限是什么呢

7、?,Notes,However, further work is required to incorporate the adaptive learning capability that would enable automated refinements to the response policy based on experience over time. 然而,未来的工作要求具有能够通过时间积累经验来自动完善响应策略的适应性学习的能力。,2 Native XML Databases,1. What is a Native XML Database? 2. Native XML Dat

8、abase Architectures 2.1 Text-Based Native XML Databases 2.2 Model-Based Native XML Databases 3. Features of Native XML Databases 3.1 Document Collections 3.2 Query Languages 3.3 Updates and Deletes 3.4 Transactions, Locking, and Concurrency 3.5 Round-Tripping 3.6 Remote Data 3.7 Indexes 3.8 External

9、 Entity Storage,Key Words,native XML database 原生XML数据库 hierarchical database 层次数据库 schema n.模式 semi-structured 半结构化的 migrate v. 移植 metadata n. 元数据 drawback n. 缺点,短处 DOM 文档对象模型(Document Object Model),Key Words,BLOB 数据库中的二进制大对象(binary large object) rollback n. 回滚 locking n. 锁定,封锁 concurrency n. 并行,并发,

10、Notes,Another reason is that native XML databases preserve things like document order, processing instructions, and comments, and often preserve CDATA sections, entity usage, and so on, while XML-enabled databases do not. 此外,由于native XML数据库保留了文件顺序、处理指令、注释、CDATA块以及实体引用等,而支持XML的数据库(XML-enabled databas

11、e)无法做到。 This is because the database can perform a single index lookup, position the disk head once, and, assuming that the necessary fragment is stored in contiguous bytes on the disk, retrieve the entire document or fragment in a single read. 这是因为数据库只需进行一次检索和磁头定位,并且假定所需的文件(片段)在磁盘上是连续存储的话,只需一次读盘就可读

12、出整个文件或文件片段。,Notes,Also like a hierarchical database, text-based native XML databases are likely to encounter performance problems when retrieving and returning data in any other form, such as inverting the hierarchy or portions of it. 和层次结构数据库一样,当以其他形式比如转置层次存取数据时,基于文本的原生XML数据库也会遇到效率问题。 One important

13、 feature of native XML databases is that they can round-trip XML documents. That is, you can store an XML document in a native XML database and get the “same“ document back again. This is important to document-centric applications Native XML数据库的一个重要特性是它可以为XML文档提供“往返车票(round-trip)”。就是说你可以将XML文件存放在原生X

14、ML数据库中,而且再取回“同样”的文件。对于以文档为中心的应用程序来说非常重要。,Notes,Whether the data is live - that is, whether updates to the document in the native XML database are reflected in the remote database - depends on the native XML database. Native XML数据库决定了这些数据是不是新鲜的-即Native XML数据库中文档的更新是否在外部数据库中反映出来。 On the other hand, if

15、 the document were part of a collection of historical weather data, it would be a mistake not to expand the entity reference, as the document would always retrieve the current data rather than containing the historic data. 另一方面,如果文件是气象历史资料的一部分,那么不完全展开它反而是不对的,否则文件总是含有当前的数据而不是历史资料了。,Reading Material 1

16、 3G Technology,1. Standard 2. History 3. Today 4. Features and Benefits 5. Future CDMA2000 1xEV-DO CDMA2000 1xEV-DO Rev. A EV-DO Rev. B HSDPA/HSUPA,Reading Material 2 Voice over IP,1. Introduction 2. What is VoIP? 3. How does it work? 4. Benefits of VoIP 5. Key Issues 6. Conclusion,Exercises,IDS stand for _. In addition to automation, the automated intrusion response system needs two further desirable c

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号