• According to the site, vulnerability phyla are classified into "seven plus one" pernicious kingdoms presented in the order of importance to software security

    根据这个站点分类,任何漏洞可以归类下面这个”7+1“个的致命“,下面的些”界“的先后顺序是按照影响软件安全的程度从高到低排序的。

    youdao

  • The company said it might release a software update to fix the problem, adding that adjusting the browser's security Settings to 'high' will protect users from vulnerability.

    微软公司可能进行软件升级解决这个问题,并表示用户浏览器安全级别调高级保护他们免受侵害。

    youdao

  • The essence of software vulnerability is to exploit and affect system security.

    软件脆弱性本质利用该脆弱性可以影响系统安全

    youdao

  • Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.

    安全需求分析软件漏洞分析重要一个环节,能够指明分析的方向提高分析的效率。

    youdao

  • Vulnerability is a serious menace to software security, so vulnerability detection has important meanings for improving software security.

    漏洞软件安全一个严重威胁,如何检测软件中存在的漏洞提高安全性具有重要意义

    youdao

  • Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.

    本文在对完善的安全漏洞收集模型分析基础指出开发一种新的软件——安全漏洞自动收集软件的必要性。

    youdao

  • This research will provide good reference in the monitoring and management of the software bugs information market and the information security regarding to vulnerability more effectively.

    此项研究为实现有效监控软件漏洞市场更好地管理软件漏洞带来安全问题提供一些参考

    youdao

  • This research will provide good reference in the monitoring and management of the software bugs information market and the information security regarding to vulnerability more effectively.

    此项研究为实现有效监控软件漏洞市场更好地管理软件漏洞带来安全问题提供一些参考

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定