• :“认为亚马逊应该提供脆弱性评估病毒扫描的系统。”

    "I think that Amazon should provide infrastructure for doing vulnerability assessments and virus scans," he says.

    youdao

  • 行动4.1:提供技术支持,以建立能力评估监测气候变化相关健康风险脆弱性

    Action 4.1: Provide technical support for building capacity to assess and monitor vulnerability to climate change-related health risks.

    youdao

  • AppDetectivePro早已确立数据库脆弱性扫描评估履约能力标准

    AppDetectivePro has long set the standard for database vulnerability scanning, assessment and compliance capabilities.

    youdao

  • 风险评估成为谅解技术基础关键制定有效战略减轻脆弱性保护计算资源完整性

    Risk assessments form the technical basis of this understanding and are critical to formulating effective strategies to mitigate vulnerabilities and preserve the integrity of computing resources.

    youdao

  • 本文工作设计实现一个易于使用功能强大的计算机网络脆弱性评估系统

    The work based on this paper is to design and implement an easy-to-use and powerful computer vulnerability assessment system.

    youdao

  • 气候变化下水资源脆弱性评估水资源系统综合评估主要包括水资源供给需求平衡的评估

    The vulnerability assessment of water resources is comprehensive analysis of water resources ecosystem, including the supply and demand of water resources.

    youdao

  • 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 脆弱性评估气候变化政策研究主要分析工具适应性管理提供参考依据。

    Vulnerability assessment is a tool for analyzing research of climate change policy, and will serve as an reference for adaptation management.

    youdao

  • 文章介绍了一个可用的目的地可持续性框架评估目的地脆弱性弹性还有支持成功的弹性建设目标

    The paper presents the Destination Sustainability Framework (DSF) designed to assess destination vulnerability and resilience, and support successful resilience-building initiatives.

    youdao

  • 攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    youdao

  • 例如脆弱性评估必须参考隶属关系资产暴露程度技术实现易程度等。

    For example, in the vulnerability assessment, we must refer to the affiliation, exposures to assets, the technology difficulty of achieving.

    youdao

  • 另外脆弱性威胁评估增加更多参考指标

    In addition, the article add more references indicators in vulnerability and threat assessments.

    youdao

  • 采用脆弱性评估中的综合指标法,编制评估电力应急体系脆弱性指标体系。

    The index system in power emergency system vulnerability assessment was compiled by using comprehensive indexes.

    youdao

  • 另外,针对脆弱性评估本文提出了另外一种灵活方案,对软件漏洞评估调整可基于严重度高低作出相应提高或降低。

    In addition, in the vulnerability assessment, this paper presented one another flexible program in which the adjustment of the software vulnerability assessment was based on its severity.

    youdao

  • 另外,针对脆弱性评估本文提出了另外一种灵活方案,对软件漏洞评估调整可基于严重度高低作出相应提高或降低。

    In addition, in the vulnerability assessment, this paper presented one another flexible program in which the adjustment of the software vulnerability assessment was based on its severity.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定