Prior to each test, the system testers configured several product parameters to allow the memory leak analysis information to be collected during testing.
在每个测试之前,系统测试人员配置许多产品参数来允许在测试过程中收集内存泄漏分析信息。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Unfortunately, many people fear the use of the Internet to pay for the payment of knowing that their personal information will leak, but a matter of fact, this is a very safe system.
不幸地,许多人民恐惧使用互联网为付付款,相信他们的个人信息将泄漏,但是实际上,这是一个非常安全系统。
By actual test data, the leak detection system can rule out the stations affected by changes in working conditions can be accurately presented on the pipeline leak alarm and location information.
通过数据测试,该系统能够有效的排除站内工况调整影响,并能够准确的对管道泄漏给出报警和定位信息。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
On the other hand, traditional document management system cannot protect secret documents of users effectively which results in the leak of document information.
同时,传统文档管理系统还不能有效保护用户的隐私文档,造成了隐私文档信息泄露。
On the other hand, traditional document management system cannot protect secret documents of users effectively which results in the leak of document information.
同时,传统文档管理系统还不能有效保护用户的隐私文档,造成了隐私文档信息泄露。
应用推荐