首先阐述了分布式安全审计的概念。
Firstly, the notion of distributed security audit system is introduced.
安全审计业务。
作为一项最佳实践,应该对数据库执行随机安全审计。
As a best practice, perform random security audits on your database.
最后,任何前摄性安全计划都应该包括随机的安全审计。
Finally, any proactive security plan should include random security audits.
因此网络安全审计系统开始受到广泛的重视。
Network security auditing system catches more and more attention of the system administrators.
介绍了一种基于图论的安全审计域规划模型。
安全审计是安全数据库的一个重要的组成部分。
准备第三方外部审计,如质量,环境,安全审计。
Prepare for external audits by the third parties, i. e. quality, environment, safety audits.
Nmap是一个用于网络检测或安全审计的免费开源工具。
Nmap is a free, open source utility for network exploration or security auditing.
而网络安全审计是网络安全体系的一个重要部分。
While web security audit is an important part of the web security system.
安全审计业务。
研究与开发网络安全审计系统具有重要的现实意义。
Thus it is meaningful to study and develop the network security audit system.
本论文主要研究有效的安全审计系统的设计与实现。
This thesis focuses on the design and implementation of effective audit.
在安全审计和发生安全入侵事件时,这些信息都很重要。
All this information proves to be vital during security audits and incidents related to breaching.
回收带有纪录的再生安全审计货柜将不再一声不啃地失败。
Reprocessing or Trashing Audit Log containers with a log no longer fails silently.
本文着重分析了网络安全审计是如何在网络安全中起作用的。
This paper is about how the web security audit work in the web security.
为了解决内网安全问题,安全审计系统作为解决方案被提出来。
In order to solve internal security problems, security audit system is proposed as a solution.
工作方向:网络安全相关管理、设计与分析,网络安全审计等。
Working direction: network security management, design and analysis, network security audit, etc...
网络集中安全审计系统的研究与应用已经成为国内外研究的热点。
The research and application of network concentration security audit system is becoming the focus of world.
该模型针对安全审计数据,融合了一个备份恢复和数据挖掘模块。
The model integrates one backup-restore and data mining module for the data of security audit.
网络数据包捕获技术,是实现入侵检测、网络安全审计的关键技术。
Packet capture is the key technology of intrusion detection system and network security audit.
安全审计愈来愈受关注,但是大多数分布式安全审计系统仍不成熟。
Security audit catch more and more attentions. But most distributed security audit systems are immature.
为了提高安全审计的实时性,引入典型集方法压缩正常行为特征库。
In order to improve the real-time efficiency, a typical set method is introduced to compress the normal signature database.
本文的安全审计系统主要由数据采集、数据分析、日志记录三部分组成。
This security audit system mainly consists of three parts: data collection, data analysis and logging.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
入侵检测技术是安全审计中的核心技术之一,是网络安全防护的重要组成部分。
Intrusion detection technology is the core technology security audit is one of the important network security components.
本文介绍了十二种DB2的安全最佳实践——从使用加密的身份验证模式一直到执行安全审计。
In this article, twelve DB2 security best practices were reviewed, ranging from using encrypted authentication modes to performing security audits.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
数字权限管理安全审计日志记录的内容由数字权限管理安全审计日志描述模型给出。
The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log.
数字权限管理安全审计日志记录的内容由数字权限管理安全审计日志描述模型给出。
The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log.
应用推荐