英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

adulterous    音标拼音: [əd'ʌltɚəs]
a. 通奸的,不贞的

通奸的,不贞的

adulterous
adj 1: characterized by adultery; "an adulterous relationship";
"extramarital affairs"; "the extracurricular activities
of a philandering husband" [synonym: {adulterous},
{extramarital}, {extracurricular}]
2: not faithful to a spouse or lover; "adulterous husbands and
wives"; "a two-timing boyfriend" [synonym: {adulterous},
{cheating(a)}, {two-timing(a)}]


请选择你想看的字典辞典:
单词字典翻译
Adulterous查看 Adulterous 在百度字典中的解释百度英翻中〔查看〕
Adulterous查看 Adulterous 在Google字典中的解释Google英翻中〔查看〕
Adulterous查看 Adulterous 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Cybersecurity | NIST - National Institute of Standards and Technology
    NIST develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U S mandates that all federal agencies implement NIST’s cybersecurity standards and guidance for non-national security systems Our cybersecurity activities also are driven by the needs of U S industry and the broader public
  • Cybersecurity Framework | NIST
    On April 8, 2025, the Department for Science, Innovation Technology in the United Kingdom (UK) published a mapping of the UK Cyber Governance Code of Practice to the NIST Cyber Security Framework (CSF) This mapping document is for boards, directors and Chief Information Security Officers (or equivalent) and will help understand the Cyber
  • Updates | CSRC - NIST Computer Security Resource Center
    News and Updates from NIST's Computer Security and Applied Cybersecurity Divisions An official website of the United States government Here’s how you know In addition to publishing a report on the "Workshop on Foundational Cybersecurity Activities for IoT Device Manufacturers" (IR 8572), an initial public draft of IR 8259r1
  • Free and Low Cost Online Cybersecurity Learning Content
    Free cybersecurity curriculum that is primarily video-based or provide online assignments that can be easily integrated into a virtual learning environments Computer Security Education Resource Collection: Community-sourced collection of free resources related to computer security, cybersecurity, and information security education
  • The NIST Cybersecurity Framework (CSF) 2. 0 - NIST Computer Security . . .
    The NIST Cybersecurity Framework (CSF) 2 0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization — regardless of its size, sector, or maturity — to better understand, assess, prioritize, and communicate its cybersecurity efforts
  • NIST Computer Security Resource Center | CSRC
    A revised Measurement Guide for Information Security is now available, along with updated resources under the Measurements for Information Security project ; NIST has published three new standards for Post-Quantum Cryptography, specifying two digital signature schemes and a key-encapsulation mechanism scheme ; The NIST Cybersecurity Framework (CSF) 2 0 is now available, along with numerous
  • The NIST Cybersecurity Framework (CSF) 2
    Outcomes are mapped directly to a list of potential security controls for immediate consideration to mitigate cybersecurity risks cybersecurity challenges or whether it has been active for many years with a sophisticated, well-resourced cybersecurity team T he CSF is designed to be valuable for any type of
  • Security and Privacy Controls for Information Systems and Organizations
    This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks The controls
  • NIST Cybersecurity Fundamentals Presentation
    The material is in sections: Cybersecurity Basics; Cybersecurity Threats; Risk Management; Cybersecurity Framework; and Small Business Cybersecurity Resources You and your team will become familiar with common threats like phishing and ransomware, understand steps you can take every day to prevent falling victim and steps to take to recover
  • Guide to Computer Security Log Management - NIST
    and disposing of computer security log data Log management is essential to ensuring that computer security records are stored in sufficient detail for an appropriate period of time Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems





中文字典-英文字典  2005-2009