英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

solicit    音标拼音: [səl'ɪsɪt]
vt.
vi. 请求,乞求,诱惑,征求

请求,乞求,诱惑,徵求

solicit
v 1: make a solicitation or entreaty for something; request
urgently or persistently; "Henry IV solicited the Pope for
a divorce"; "My neighbor keeps soliciting money for
different charities" [synonym: {solicit}, {beg}, {tap}]
2: make amorous advances towards; "John is courting Mary" [synonym:
{woo}, {court}, {romance}, {solicit}]
3: approach with an offer of sexual favors; "he was solicited by
a prostitute"; "The young man was caught soliciting in the
park" [synonym: {hook}, {solicit}, {accost}]
4: incite, move, or persuade to some act of lawlessness or
insubordination; "He was accused of soliciting his colleagues
to destroy the documents"
5: make a solicitation or petition for something desired; "She
is too shy to solicit"

Solicit \So*lic"it\, v. t. [imp. & p. p. {Solicited}; p. pr. &
vb. n. {Soliciting}.] [F. sollicier, L. sollicitare,
solicitare, -atum, fr. sollicitus wholly (i. e., violently)
moved; sollus whole citus, p. p. of ciere to move, excite.
See {Solemn}, {Cite}.]
1. To ask from with earnestness; to make petition to; to
apply to for obtaining something; as, to solicit person
for alms.
[1913 Webster]

Did I solicit thee
From darkness to promote me? --Milton.
[1913 Webster]

2. To endeavor to obtain; to seek; to plead for; as, to
solicit an office; to solicit a favor.
[1913 Webster]

I view my crime, but kindle at the view,
Repent old pleasures, and solicit new. --Pope.
[1913 Webster]

3. To awake or excite to action; to rouse desire in; to
summon; to appeal to; to invite.
[1913 Webster]

That fruit . . . solicited her longing eye.
--Milton.
[1913 Webster]

Sounds and some tangible qualities solicit their
proper senses, and force an entrance to the mind.
--Locke.
[1913 Webster]

4. To urge the claims of; to plead; to act as solicitor for
or with reference to. [Obs.]
[1913 Webster]

Should
My brother henceforth study to forget
The vow that he hath made thee, I would ever
Solicit thy deserts. --Ford.
[1913 Webster]

5. To disturb; to disquiet; -- a Latinism rarely used.
[1913 Webster]

Hath any ill solicited thine ears? --Chapman.
[1913 Webster]

But anxious fears solicit my weak breast. --Dryden.
[1913 Webster]

Syn: Syn. To beseech; ask; request; crave; supplicate;
entreat; beg; implore; importune. See {Beseech}.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
solicit查看 solicit 在百度字典中的解释百度英翻中〔查看〕
solicit查看 solicit 在Google字典中的解释Google英翻中〔查看〕
solicit查看 solicit 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Continuous Threat Exposure Management (CTEM) Explained
    Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure through an iterative approach that emphasizes building structured organizational processes in addition to leveraging security tools
  • Continuous Threat Exposure Management (CTEM) - XM Cyber
    Discover why the Continuous Threat Exposure Management (CTEM) framework is reshaping how organizations address cyber risk As environments expand and threats evolve, traditional vulnerability management falls short CTEM delivers a proactive, risk-based approach that continuously identifies, validates, and prioritizes exposures based on real attack paths and business impact
  • CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to . . .
    Discover how CTEM, VM, and ASM work together to enhance cybersecurity, providing real-time visibility and proactive threat management
  • Proactive Security with Continuous Threat Exposure Management (CTEM . . .
    Conclusion The Continuous Threat Exposure Management (CTEM) framework is an essential strategy for organizations aiming to build resilience against an ever-evolving threat landscape It demands a proactive, cyclical, and integrated approach to security
  • Transforming Cybersecurity With Continuous Threat Exposure Management
    Stay ahead of cyber threats with Continuous Threat Exposure Management—a proactive approach to identifying, prioritizing, and mitigating risks before attackers strike
  • CTEM (Continuous Threat Exposure Management): 5 Stages + Practical . . .
    In today's dynamic cyber threat landscape, organizations face an ever-evolving array of vulnerabilities and attack vectors Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, offers a proactive and structured approach to identifying, assessing, and mitigating these risks in real time By continuously monitoring and refining security postures, CTEM enables businesses
  • Beyond Vulnerability Scans: The CISO’s Complete Guide to Continuous . . .
    The definitive 2025 guide for CISOs on Continuous Threat Exposure Management (CTEM) Learn strategic CTEM frameworks, business-aligned exposure prioritization, attack surface mapping, and validation techniques
  • What is CTEM? - Tenable
    A continuous threat exposure management program is structured to help your teams effectively evaluate and prioritize risk mitigation while continuously maturing your cybersecurity posture Established by Gartner in 2022, "CTEM is a methodology that fully encompasses people, processes and technologies, allowing an organization to continually and consistently evaluate the accessibility, exposure
  • External Attack Surface Management (EASM) vs Continuous Threat Exposure . . .
    Based on our experience in external attack surface management (EASM) and continuous threat exposure management (CTEM) solutions, understanding the gap between the CTEM framework and EASM requires considering what happens after asset discovery
  • What is CTEM? Continuous Threat Exposure Management | Wiz
    Continuous Threat Exposure Management (CTEM) is a proactive, five-phase program that continuously identifies, prioritizes, validates, and remediates security exposures Unlike traditional vulnerability management, CTEM aligns security efforts with business risk by focusing on exploitable attack paths that threaten critical assets





中文字典-英文字典  2005-2009