网站首页  词典首页

请输入您要查询的英文单词:

 

单词 security-analysis
释义

security analysis

美 
英 
  • un.证券分析
  • 网络安全分析;有价证券分析;安全性分析
un.
1.
证券分析

例句

释义:
1.
First published in 1934, his Security Analysis is still considered to be the value investing bible for investors of every ilk.
1934年初版以后,他的《证券分析》一直被各类投资者奉为价值投资的圣经。
www.bing.com
2.
The U. N. 's food security analysis unit and a famine warning project known as FEWS-NET say the famine in southern Somalia is growing worse.
联合国粮食安全分析机构和饥荒预警系统网(FEWSNET)表示,索马里南部的饥荒正在恶化。
www.ebigear.com
3.
Static security analysis is an important component of energy management system, as an important means to ensure secure operation.
电力系统的静态安全分析是能量管理系统的重要组成部分,是保证系统安全运行的重要手段。
www.boshuo.net
4.
Security analysis shows ESMT could guarantee data availability to a certain degree as well as effectively enhance data confidentiality.
安全性分析表明,ESMT能够在保证一定程度的数据可用性的同时,有效的增强数据传输的机密性。
www.fabiao.net
5.
The object of security analysis is to answer, or assist in answering, certain questions of a very practical nature.
证券分析的目的是要回答或帮助回答某些非常实际性的问题。
blog.sina.com.cn
6.
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
www.dictall.com
7.
The range of modeling and simulation are: the reactor coolant system (RCP) and the auxiliary systems relative to security analysis.
建模与仿真的范围是:反应堆冷却剂系统(RCP)、与安全分析相关的一回路辅助系统。
www.13191.com
8.
All the above can be used as theoretical basis of seismic security analysis and control and economic loss analysis of power supply system.
该工作可作为电力系统地震后安全分析与控制和经济损分析的理论基础。
www.boshuo.net
9.
Accurate short-term load forecasting plays an essential role in planning, economical scheduling and security analysis in production.
精确的负荷预测对于电力系统的生产安排、经济调度和安全分析都起着十分重要的作用。
www.juhe8.com
10.
Through the security analysis, the model has settled users' best riding problem yet still achieved security property.
安全分析表明,在解决用户跨步问题的前提下,没有降低模型的安全性。
epub.cnki.net
1.
The Intelligent Investor was the layman's version of Security Analysis.
而《聪明的投资者》则是《证券分析》一书给外行人看的版本。
www.ftchinese.com
2.
To resolve these problems, this paper on two issues: the program for Remote BATS research and static security analysis software development.
为解决上述问题,本文主要研究了两个问题:远方互投方案研究和静态安全分析软件开发。
www.fabiao.net
3.
The theoretical security analysis shows that the credibility of this model equals the non-interference model based on the trusted root.
理论分析结果表明,该模型的可信性与基于可信根的无干扰可信模型等价。
www.jsjkx.com
4.
Delves into top-down investment methodology as well as individual security analysis.
深入研究了自上而下的投资方法,以及个人安全分析。
www.ccebook.net
5.
A third is an original copy of the book you hold in your hands, Graham and Dodd's Security Analysis.
其三乃阁下手捧之格雷厄姆和多德所著《证券分析》(余所藏为原印本)。
blog.sina.com.cn
6.
The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control.
研究表明,可拓集与关联度分析是网络安全分析与控制的有效工具。
lib.cqvip.com
7.
Assist to complete each promotion of financial product, and participate in making the security analysis report.
协助完成各项金融产品的推广,并参与完成证券分析报告。
www.tianya.cn
8.
The main book on the fundamental analysis of stocks is Security Analysis by Graham and Dodd.
基本面分析方面主要的书是格雷厄姆和多德写的《证券分析》。
bbs.translators.com.cn
9.
That doesn't mean your child needs an M. B. A. in security analysis or that you need to hire a financial adviser to tutor your preschooler.
这并不意味着你家孩子需要念个证券分析领域的MBA、或者你该聘个理财顾问来给家里的学龄前儿童来个启蒙教育。
chinese.wsj.com
10.
Please discusses and selects an industry to do security analysis.
请选择一个行业进行分析讨论。
img3.zhubajie.com
1.
In 1934 Graham and Dodd had co-authored the seminal text on investing, Security Analysis.
1934年,格雷厄姆与多德合著了投资领域影响深远的教科书《证券分析》(SecurityAnalysis)。
www.ftchinese.com
2.
In general, no. I am no longer an advocate of elaborate techniques of security analysis in order to find superior value opportunities.
现在来说,我不再是对证券做出精细的分析,以找出更好的价值机会的技术的支持者了。
www.bing.com
3.
And so this concludes my song and Web security analysis.
我的歌曲和Web安全性分析到此就结束了。
www.ibm.com
4.
At last, NS-2 platform is adopted to simulate them and make performance and security analysis.
采用NS-2平台对其进行仿真,并进行性能和安全性分析。
www.ceps.com.tw
5.
At last NS-2 platform was adopted to simulate it and make performance and security analysis.
最后采用NS-2平台对其进行仿真,并进行了性能和安全性的分析。
www.ceps.com.tw
6.
A Security Analysis of the IPSec Based WLAN Solution and a Study of Its Algorithm
基于IPSec的无线局域网安全通信机制分析及其算法研究
www.ilib.cn
7.
Security Analysis of a Multistage Chaotic Encryption System and its Secret Key Mapping Technique
一个多级混沌加密系统的安全性分析及其密钥映射技术
service.ilib.cn
8.
Operational Research Insurance Managerial Accounting International Trade International Finance Security Analysis and Investment
运筹学保险学管理会计国际贸易国际金融证券投资学
wenku.baidu.com
9.
Environmental Security Analysis of In fluence of Genetically Modified Soybean to Local Soybean and Its Countermeasure
种植转基因大豆对地产大豆的环境安全分析与对策研究
www.ilib.cn
10.
attack graph; network attack modeling; vulnerability detection; scalability; network security analysis; network key point;
攻击图;网络建模;漏洞检测;可扩展性;网络安全浅析浅析;网络关键节点;
www.zidir.com
1.
Security Analysis and Improvement of A Zero-knowledge Proof Identification Scheme
一种零知识证明协议的安全分析与改进
service.ilib.cn
2.
Security analysis of a threshold shared verification signature scheme
对一个门限共享验证签名方案的安全性分析
www.ilib.cn
3.
Security Analysis and Improvement of a Message Recovery Signature Scheme
一个具有恢复消息的数字签名方案的安全性分析及其改进
www.ilib.cn
4.
the modern power system; static voltage stability study; modal analysis method; Jacobian matrix; power system static security analysis;
现代电力系统;静态电压稳定性;模态浅析浅析法;雅可比矩阵;稳定裕度;静态安全浅析浅析;
www.zidir.com
5.
Network Security Protocol by PKI Structure and Security Analysis of Its Typical Cryptosystem
PKI结构下网络安全协议模型及典型密码体制安全性分析
www.ilib.cn
6.
The positive Chinese line surmounts the tower pile foundation to the embankment flood prevention security analysis Appraisal
阳汉线跨越塔桩基对堤防防洪安全的分析评价
www.ilib.cn
7.
Remote Sensing Dynamic Change Monitoring of Cultivated Land and Ecological Environment Security Analysis in Region of Yellow River Mouth
黄河口耕地遥感动态临测及其生态环境安全分析
www.ilib.cn
8.
The security analysis of the chaotic spreading sequences generated by the extended chaotic map
广义映射混沌扩频序列的保密性分析
ilib.cn
9.
The security analysis for the determination of lightning arrester protective range with fold line and ground ball methods
折线法和滚球法确定避雷针保护范围的安全性分析
service.ilib.cn
10.
Security Analysis and Solution of Transparent Factory Network-- Ethernet for Industrial Control Networks
透明工厂网络的安全性分析与解决方案--用于工业控制网络的以太网
scholar.ilib.cn
1.
Security Analysis and Radioprotection Method of Sealed Source Used in Nuclear Logging
核测井用密封放射源辐射防护方法和安全性分析
service.ilib.cn
2.
The Security Analysis of the Framework Structure with Unequal Foundation Settlement
地基不均匀沉降后的某框架结构安全性分析
168.160.184.78
3.
Security analysis of a signature scheme with message recovery
一个具有消息恢复的签名方案的安全性分析
service.ilib.cn
4.
Network security analysis and countermeasures of dispatching automation system in Sanshui
三水调度自动化系统网络信息安全分析与对策
www.ilib.cn
5.
Formal Model and Security Analysis for Cryptographic Protocols in the Distributed Network Environment
分布式网络环境下密码协议形式模型和安全性
www.ilib.cn
6.
Security Analysis and Solutions of a Video Conference System
视频会议系统的安全分析与措施
service.ilib.cn
7.
Network Security Analysis and Countermeasures in Libraries of Colleges and Universities
高校图书馆网络安全分析与对策
service.ilib.cn
8.
Dynamic Security Analysis of Frame Structure Encountering Blasting Seismic Wave,
汪芳,框架结构在爆破地震波作用下的动力安全性分析,
www.luxinzheng.net
9.
SOAP Message Security Analysis and Implementation of Encryption, Signature
SOAP消息安全性分析及其加密、签名的实现
ilib.cn
10.
Research on Security Analysis of District Power Network Considering the Maximal Load Forecasting
考虑最大负荷预测的地区电网静态安全分析研究
service.ilib.cn
1.
security analysis of public - key cryptography based on chaotic attractors of neural networks and its implementation
基于神经网络混沌吸引子的公钥密码算法安全性分析及其实现
www.ichacha.net
2.
A Masked Electronic Codebook Mode of Operation and Its Security Analysis
一个伪装的电码本模式及其安全性分析
service.ilib.cn
3.
Security Analysis of Publicly Available Keyless Watermarking System
公开可得到的无密码水印系统的安全性分析
service.ilib.cn
4.
Improvement of TLS in the Wireless Environment and its Security Analysis
TLS在无线环境下的改进及安全性分析
www.ilib.cn
5.
Key exchange implementation and security analysis for IPSec based virtual private network
基于IPSec的虚拟专用网络密钥交换实现及其安全分析
www.ilib.cn
6.
Security Analysis of an Elliptic-Curve Based Encryption Scheme
对一种基于椭圆曲线加密体制的安全性分析
service.ilib.cn
7.
Security Analysis and Researching Guides for Encryption Algorithms
密码算法的安全性分析及研究方向
www.ilib.cn
8.
Security Analysis on a Multicast Source Authentication Scheme
一个组播源认证方案的安全分析
www.ilib.cn
9.
Dual-velocity protocol of hybrid QKD system and its security analysis
复合量子密钥分发系统双速协议及其安全性分析
www.ilib.cn
10.
Security analysis and improvement of several partial blind signature schemes
对几种部分盲签名方案的安全性分析与改进
www.ilib.cn
1.
Mainstream operating system security analysis and security
主流操作系统安全性分析及安全策略
www.ilib.cn
2.
A Statistic Analysis of Investors'Information Demand from Security Analysis
投资者对证券分析师的信息需求统计分析
www.ilib.cn
3.
A Novel Multilevel Security Petri Net and its Security Analysis
一种新的安全Petri网及其多级安全机制分析
service.ilib.cn
4.
Security Analysis and Protection of Public Security Information Network of City-Level
地市级公安信息网安全分析与防范
www.ilib.cn
5.
Security analysis of a digital multisignature scheme
一种多重数字签名方案的安全性分析
service.ilib.cn
6.
Environmental Security Analysis and Evaluation of High-rise Buildings
高层建筑的环境安全分析与评价
service.ilib.cn
7.
Security Analysis and Solution of User Password Identification Scheme
用户名密码认证方案的安全性分析及解决方案
www.ilib.cn
8.
Reinforcing Technology and Security Analysis of Existing Tunnel
既有隧道安全性分析与加固技术
ilib.cn
9.
Research and Security Analysis on Identity Authentication
身份认证技术的研究与安全性分析
ilib.cn
10.
Design and Application of Static Security Analysis in a Sub-Transmission Network Based on Twice Topology Analysis
基于双拓扑分析的地区电网静态安全分析
www.ilib.cn
1.
Identity Authentication Mechanism Based on Chaotic Theory and its Security Analysis
基于混沌理论的身份认证机制及其安全性分析
service.ilib.cn
2.
Wlan Security Analysis and Implementation of Intrusion Detection on Linux
基于Linux的无线网络安全分析与入侵检测
service.ilib.cn
3.
Security Analysis and Research of Routing Protocols in Wireless Sensor Network
无线传感器网络路由协议的安全性分析与研究
service.ilib.cn
4.
Security Analysis about Operation in Municipal Drainage System
城市排水系统运行安全性分析
168.160.184.78
5.
Security analysis of a new ID-based signcryption
基于ID的新签密方案的安全性分析
service.ilib.cn
6.
Mandatory Access Control Modeling and Security Analysis: A Petri-Nets Based Method
基于Petri网的强制访问控制模型及其安全分析
service.ilib.cn
7.
Improved CBC mode of operation and its security analysis
改进的CBC模式及其安全性分析
service.ilib.cn
8.
Security Analysis and Improvement of Wired Equivalent Privacy
有线等价私密算法的安全性能分析与改进
www.ilib.cn
9.
Determination of Residual Nicarbazin by HPLC and Security Analysis
尼卡巴嗪残留量测定和安全性分析
www.ilib.cn
10.
Security Analysis for Steam Turbine Starting and Stopping without Motor Pump
汽动给水泵实现大型汽轮机组启停的安全性分析
www.ilib.cn
1.
The Data Security Analysis of the Nonvolatile Memorizer
非易失存储器数据安全性研究
www.ilib.cn
2.
Introduction and security analysis of triple churning algorithm in EPON
EPON三重搅动加密算法及其安全性分析
www.ilib.cn
3.
Detecting and security analysis of spillway radial gate in Shimen reservoir
石门水库溢洪道弧形闸门检测与安全分析
scholar.ilib.cn
4.
A Security Analysis On Network Services Of Routers and the Corresponding Strategies
路由器网络服务安全性分析与对策
service.ilib.cn
5.
Security Analysis on Administrative Model of Role-Based Access Control
基于角色访问控制管理模型的安全性分析
www.ilib.cn
6.
The Security Analysis to Balanced Shrinking Generators
平衡收缩序列的安全性分析
www.ichacha.net
7.
Security Analysis and Security Protection for Stock Network
证券网络的安全分析与防范措施
ilib.cn
8.
security analysis of ku - chien ' s remote authentication scheme
远程身份认证方案的安全性分析
www.ichacha.net
9.
Research on seismic security analysis and flow load control of power supply system
供电系统地震安全分析与负荷控制研究
service.ilib.cn
10.
Security analysis for proactive secret sharing system
先应秘密共享系统的安全性分析
www.ilib.cn
1.
The Security Analysis on the JSP Application and the Solving Countermeasures
JSP应用安全分析及解决对策
www.ilib.cn
2.
Data Communication Security Analysis in Same CityCollectFees System
同城收费系统中数据传输的安全性分析
service.ilib.cn
3.
Security Analysis On The Query Policy For Database Encryption System
密文数据库查询策略安全性的分析
ilib.cn
4.
Security analysis on authorized group signature
授权群签名的安全性分析
scholar.ilib.cn
5.
Security Analysis on Electronic Business System
企业电子商务系统的安全性分析
www.ilib.cn
6.
Security Analysis of Hunan Electric Power Computer Wide Area Network
湖南电力计算机广域网安全分析
ilib.cn
7.
The Security Analysis and Improvement of Remote Online Network Racks
远程在线实验平台的安全性分析与改进
ilib.cn
8.
The Security Analysis of Broadband IP Metropolitan Area Network
宽带城域网的网络安全分析
www.ilib.cn
9.
DAMODARAN ON VALUATION: Security Analysis for Investment and Corporate Finance
价值评估:证券分析、投资评估与公司理财
www.china-pub.com
10.
New Approach to Load-shedding in Static State Security Analysis of Power Systems
静态安全分析中的联动切负荷算法
www.ilib.cn
1.
Research of User Authentication Mechanismand Its Security Analysis
身份认证机制研究及其安全性分析
www.ilib.com.cn
2.
Research on computer network security analysis model
计算机网络安全性分析建模研究
service.ilib.cn
3.
Security Analysis of Area Navigation Parallel Airway
平行区域导航航路安全性分析
www.ilib.cn
4.
User IdentityNetwork Based Behavior Security Analysis
网络行为分析用户关联安全分析
wenku.baidu.com
5.
Security Analysis and Measures of WEB Application Program
WEB应用程序安全性分析及措施
www.ilib.cn
6.
Design and security analysis of GSM authentication scheme
GSM系统认证算法的设计与安全性分析
www.ilib.cn
7.
Practical Analysis on EMS Static Security Analysis Module
EMS中静态安全分析模块实用化分析
www.ilib.cn
8.
Security analysis of electronic records filing
电子文件归档的安全性分析
www.ilib.cn
9.
Security analysis of Chang et al. 's signature scheme with message recovery
对Chang等人的消息可恢复式签名方案的安全性分析
service.ilib.cn
10.
Conducting a workplace security analysis
工作场所安保分析
blog.sina.com.cn
1.
Operational Security Analysis of Coal Types in Banshan Power Plant
半山电厂燃用煤种的运行安全性分析
www.ilib.cn
2.
Security analysis of tow threshold signature scheme
两种门限签名方案的安全性分析
www.ilib.cn
3.
Security Analysis of Online Education and Solutions
远程教育网络安全分析及解决方案
www.ilib.cn
4.
Security Analysis Of Air-Conditioning Cooled Medium
空调冷媒的安全性分析
www.ilib.cn
5.
Installation and security analysis of library FTP server
图书馆FTP服务器的建立和安全分析
service.ilib.cn
6.
Overturning security analysis of ladle turret
钢包旋转塔的倾覆安全分析
www.ilib.cn
7.
Computer-Based Power System Security Analysis
电力系统计算机安全分析
ilib.cn
8.
The Security Analysis and Countermeasures of Fried Food
油炸食品安全性分析及对策措施
www.ilib.cn
9.
Web-based Decision Support System for Security Analysis
基于Web的证券分析决策支持系统
ilib.cn
10.
Application of Security Analysis of Grounding System using CDEGS Software in Large Power Plant
CDEGS软件在大型火力发电厂接地系统安全分析中的应用
www.ilib.cn
1.
Security analysis of a key management scheme for multicast based on the one-way function tree
基于单向函数树的多播密钥管理方案安全性分析
www.ilib.cn
2.
Master of Social Science (Security Analysis)
社会学硕士(安全分析)
www.baike.com
3.
Security analysis and basic strategies for GPRS access
GPRS接入的安全分析与基本对策
www.ilib.cn
4.
Security analysis and solutions of campus network
校园网安全分析及解决方法
www.ilib.cn
5.
Security Analysis of Proxy Blind Signature Scheme
代理盲签名方案的安全性分析
www.ilib.cn
6.
The Security Analysis and the Security Tactics of Library's Information System
图书馆信息系统的安全分析与安全策略
www.ilib.cn
7.
The Security Analysis about the Threshold Digital Signature Scheme Based on Discrete Logarithm and Quadratic Residue
基于离散对数和二次剩余的门限数字签名体制的安全性分析
service.ilib.cn
8.
Security Analysis About One Phase of Power Network Short to Ground in Ship
船舶电网单相对地短路的安全性分析
ilib.cn
9.
Security Analysis Using Value-Based Metrics
证券分析:基于价值的方法
eclass.cfaspace.com
10.
Foundations of Security Analysis and Design
安全分析与设计基础
list.dangdang.com
1.
Security Analysis Tool for Auditing Network
用于检杳网络的安全分析工具
sh.netsh.com
2.
PART VII ADDITIONAL ASPECTS OF SECURITY ANALYSIS. DISCREPANCIES BETWEEN PRICE AND VALUE
第VII部分证券分析的其他方面。价格和价值的偏离
blog.sina.com.cn
3.
Power System Probabilistic Security Analysis Based on Small Signal Stability Region
基于小扰动稳定域的电力系统概率安全分析
ilib.com.cn
4.
Security analysis and design of special computer LAN
专用计算机局域网安全性分析与设计方法讨论
www.ilib.cn
5.
Network security analysis based on intrusion detection technology
基于入侵检测技术的网络安全分析
www.ilib.cn
6.
Security analysis of feed-forward stream cipher
前馈序列密码的安全性分析
www.ilib.cn
7.
Security analysis of urban central heating
城市集中供热的安全性与分析
ilib.cn
8.
The Security Analysis of GSM System's Airborne Interface
GSM系统的空中接口安全性分析
www.ilib.cn
9.
Security Analysis of the Open Crude Tanks in Oil Field
油田原油罐敞口运行的安全性分析
www.ilib.cn
10.
Security Analysis and Policy in NGN Networking
NGN组网的安全性分析与安全策略
www.ilib.cn
1.
Security Analysis of ASP Network Database
ASP环境下的网络安全分析
www.ilib.cn
2.
Security Analysis of Embankment Stability Based on Reliability Theory
基于可靠度理论的路堤稳定安全性分析
www.ilib.cn
3.
A Network Security Analysis Method Research and Application Based on Case-based Reasoning
基于安全案例推理的网络安全分析方法研究与应用
www.ilib.cn
4.
Security Analysis of the Integrated Campus-card System Based on Intranet
基于校园网的一卡通系统安全性分析
ilib.cn
5.
Security Analysis of Authenticated Key Exchange Protocol Based on Password
基于口令认证的密钥交换协议的安全性分析
www.ilib.cn
6.
Implementation of VPN Based on IPSec and Its Security Analysis
基于IPSec的虚拟专用网的实现和安全性分析
www.wanfangdata.com.cn
7.
Security analysis of authenticated encryption based on Oracle model
基于Oracle模型的可认证加密协议安全性分析
www.ilib.cn
8.
Security Analysis of Authentication Based on Environment Variable in CGI Mode
CGI模式中基于环境变量认证的安全性分析
www.ilib.cn
9.
Security Analysis of a Key for Multicast Based on the One-way Function Tree
基于单向函数树的多播密钥安全性分析
www.ilib.cn
10.
Food Security Analysis of Mushroom Dictyophora rubrovalvata
红托竹荪的食品安全分析
service.ilib.cn
1.
Security Analysis by Benjamin Graham and David Dodd (1934 Edition)
证券分析(1934版)本杰明·格雷厄姆;戴维·多得
blog.sina.com.cn
2.
A Network Security Analysis Method Research and Application Based on Graph Theory
基于图论的网络安全分析方法研究与应用
www.ilib.cn
3.
Security Analysis of DFH Communication System
相关跳频通信系统安全性分析
www.ilib.cn
4.
Break-even Security Analysis and graph
盈亏安全幅度分析和盈亏平衡图
www.51ea.com
5.
Security Analysis and Improvement of Cheat-Proof Secret Sharing Scheme Based on RSA
基于RSA防欺诈秘密共享体制的安全性分析和改进
service.ilib.cn
6.
Security analysis of student Ioan
助学贷款证券化探析
www.ilib.cn
7.
Security analysis of computer LAN
计算机局域网安全浅析
service.ilib.cn
8.
Research of Security Analysis and Audit Technique Based on Network Content
网络内容安全分析及审计技术研究
www.ilib.cn
9.
Security Analysis of Some Proxy Multi-Signature Schemes Based on Elliptic Curve Cryptosystem
基于椭圆曲线的代理多签名方案的安全性分析
service.ilib.cn
10.
Security Analysis of Real-Time Embedded Software System Based on Time Petri Nets
基于时间Petri网的实时嵌入式软件系统安全性分析
ilib.cn
1.
The Structure of Internet Education System and the Security Analysis
网上教学体系结构和安全性分析
www.ilib.cn
2.
Security analysis of two protocol based on RSA
两个基于RSA的密码协议的安全性分析
www.ilib.cn
3.
The security analysis and solutions for network's management based on SNMP
基于SNMP网管的安全性分析及解决办法
www.ilib.cn
4.
The security analysis based on images information hiding
基于图像的信息隐藏安全性分析
www.ilib.cn
5.
MARKET ANALYSIS AND SECURITY ANALYSIS 697
市场分析和证券分析697
blog.sina.com.cn
6.
Security Analysis of Summer Peak for Beijing Grid in 2007
2007年北京电网度夏方式分析
www.ilib.cn
7.
Security analysis of Intemet layers
因特网各层安全性分析
www.ilib.cn
8.
Security analysis on a kind of group signatures
对一种群签名方案的安全性分析
service.ilib.cn
9.
Computer security analysis model based on fault tree
基于故障树的计算机安全性分析模型
service.ilib.cn
10.
Security Analysis and Prevention Based on DNS Attack
基于DNS攻击的安全分析及其防范
168.160.184.78
1.
Protocols Security Analysis Based on Ideal
基于理想的协议安全性分析
www.ilib.cn
2.
Economy and security analysis of AC UHV in China
交流特高压在中国应用的经济和安全分析研究
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/11/14 11:38:15