英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

inexcusable    音标拼音: [ɪnɪkskj'uzəbəl]
a. 没法辩解的,不可宽赦的

没法辩解的,不可宽赦的

inexcusable
adj 1: without excuse or justification [ant: {excusable}]
2: not excusable [synonym: {inexcusable}, {unforgivable}]

Inexcusable \In`ex*cus"a*ble\, a. [L. inexcusabilis: cf. F.
inexcusable. See {Excuse}.]
Not excusable; not admitting excuse or justification; as,
inexcusable folly.
[1913 Webster]

Therefore thou art inexcusable, O man, whosoever thou
art that judgest; for wherein thou judgest another,
thou condemnest thyself; for thou that judgest doest
the same things. --Rom. ii. 1.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
inexcusable查看 inexcusable 在百度字典中的解释百度英翻中〔查看〕
inexcusable查看 inexcusable 在Google字典中的解释Google英翻中〔查看〕
inexcusable查看 inexcusable 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Securing Networks | Cybersecurity and Infrastructure Security . . . - CISA
    Securing a network involves continuous monitoring, assessments, and mitigation across various interrelated components, including servers, the cloud, Internet of Things (IoT), internet connections and the many physical assets used to access networks CISA’s Role
  • Guidance and Strategies to Protect Network Edge Devices
    This set of guidance, led by international cybersecurity authorities, is intended to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems
  • Modern Approaches to Network Access Security - CISA
    SSE is a collection of cloud security capabilities that enable safe browsing, more secure software as a service (SaaS) application, and an easy approach to validating users accessing network data Moreover, SSE is a comprehensive approach to network security, combining networking, security practices and policies, and services to a single platform
  • A Guide to Securing Networks for Wi-Fi (IEEE 802. 11 Family) - CISA
    bypass network monitoring and security controls and may result in data loss or provide an unsecured network entry point for an attacker • Unauthorized Association – an AP-to-AP association that can violate the security perimeter of the network • Ad hoc Connections – a peer-to-peer network connection that can violate the security
  • CISA and Partners Release Guidance for Modern Approaches to Network . . .
    The Canadian Centre for Cyber Security (CCCS) The guidance urges business owners of all sizes to move toward more robust security solutions—such as Zero Trust, Secure Service Edge (SSE), and Secure Access Service Edge (SASE)—that provide greater visibility of network activity
  • Modern Approaches to Network Access Security - CISA
    The Canadian Centre for Cyber Security (CCCS) The guidance urges business owners of all sizes to move toward more robust security solutions—such as Zero Trust, Secure Service Edge (SSE), and Secure Access Service Edge (SASE)—that provide greater visibility of network activity
  • LAYERING NETWORK SECURITY - CISA
    Demilitarized Zone (DMZ): In networking, a DMZ is a physical or logical subnet that separates a local area network from other untrusted networks Since 2015, the Cybersecurity and Infrastructure Security Agency identified boundary protection as the most prevalent discovery in network security architecture assessments across multiple industries
  • Enhanced Visibility and Hardening Guidance for Communications . . .
    Disable Secure Shell (SSH) version 1 Ensure only SSH version 2 0 is used with the following cryptographic considerations [2] For more information on acceptable algorithms, see NSA’s Network Infrastructure Security Guide Configure with minimally a 3072-bit RSA key Configure with minimally a 4096 Diffie-Hellman key size (group 16)
  • 2023 Top Routinely Exploited Vulnerabilities - CISA
    Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings Purpose
  • Primary Mitigations to Reduce Cyber Threats to Operational . . . - CISA
    Overview The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Environmental Protection Agency (EPA), and Department of Energy (DOE)—hereafter referred to as “the authoring organizations”—are aware of cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the





中文字典-英文字典  2005-2009