the aim of intrusion tolerance database is to utilize unauthentic dbms to structure the believable database application system.
入侵容忍数据库研究的目标是利用不可信的数据库管理系统构建可信的数据库应用系统。
the author discusses: unauthentic information tactic, proper redundancy tactic, vagueness tactic, periphrases tactic, seeking aesthetics tactic and properly worded tactic.
它们分别是:假信息策略、适当冗余信息策略、模糊策略、迂回策略、求美策略和得体策略。
if an enterprise resorts to deception or files a unauthentic application, the customs shall not accept its application for a-class administration within two years.
企业申请时有弄虚作假或所呈不实者,海关两年内不受理对其实施a类管理的申请。
unauthentic circulation caused great damage to the advertisers and powerful publications and the damages will last long;
虚报发行量实质性损害了,并且还在继续损害广告主与发行强势报刊的利益;
firewall is a barrier at the network border to prevent network attacks, and is the only link to unauthentic network.
防火墻是位于网络边界防范网络攻击的屏障,是与不可信网络进行联络的唯一纽带。
the defendant argued the plaintiff's opinion was unauthentic in the court.
在法庭上被告争辩原告的想法毫无根据。
in the case of libel suit, the speech subject should mainly take the responsibility for rights impairment with unauthentic news of media, while the media merely have a responsibility of error.