「安全性的侵犯(security attack)安全性的侵犯(security attack) 是指外来或是内部引发的行动,造成资料的损害或是变更由于程式本身也可以看成是资料的一种,安全性...
基于8个网页-相关网页
On the same time, it has to be confronted with various security attack.
同时可能受到来自多方面频繁的安全攻击,从而导致一系列安全问题。
参考来源 - 网络数据库安全技术研究Traffic analysis is a security attack where an adversary observes network traffic in order to infer sensitive information about the identities of communicating parties and traffic patterns. The leakage of such information is often devastating in security-sensitive scenarios.
流量分析是一种安全攻击,攻击者对网络流量和内容进行观察和分析,获得通信方的身份和通信状态等重要信息,这些信息的泄露通常对安全敏感的场景是致命的。
参考来源 - 无线移动Ad hoc网络安全隐匿路由协议的研究·2,447,543篇论文数据,部分数据来源于NoteExpress
This section describes potential security attack methods from an attacker or hacker.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.
各种入侵思路与技术和漏洞利用交流、让你成为脚本安全攻防高手。
This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.
此方法不仅保护第一接入节点(3),而且分别保护后面的网络节点(10)和用户(1),免于安全攻击。
The case has generated concern among India's security establishment, still reeling from the large terror attack on Mumbai 11 months ago.
VOA: standard.2009.10.30
No one has claimed responsibility for the attack. Senior police official Ghafoor Afridi tells VOA that the bomber bypassed multiple security checkpoints.
VOA: standard.2009.09.26
One officer told local reporters that the attack started about 7:30 in the morning, when gunmen threw grenades at security forces training outside.
VOA: standard.2009.03.30
应用推荐