This method removes the potential for an SQL injection attack.
这种方法消除了SQL注入攻击的可能性。
Part of a risk assessment should include capturing and cataloging the types of information that are vulnerable to attack and the potential threats against them.
风险管理的一部分工作应当包括识别“哪些信息易于受到攻击”和“它们面临的潜在攻击”并对它们进行编目。
Each identity integration point becomes a stress point, and each credential creates a broader attack surface and potential help desk expense.
每个身份集成点都是一个压力点,而每份凭证都都扩大了攻击的受面和潜在帮助中心成本。
The other benefit is deterrence. "It will save time of fighting and will deter in many cases a potential enemy from really launching an attack."
VOA: standard.2010.07.20
American lives are on the line." Opposition Republicans see an opening in the administration's flawed handling of the failed attack, and appear eager to highlight the incident as a potential campaign issue for the November midterm congressional elections.
VOA: standard.2010.01.06
应用推荐