然后深入研究了基于网络的安全扫描与基于主机的安全扫描两种技术,并分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。
Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.
一些工具就Web应用程序的安全问题分析代码,而其他的为相关性问题扫描代码。
Some analyze code for security problems for Web applications, and others scan code for dependency problems.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
此外,它还配备了一些其他的,有用的安全工具,它可以用来扫描,消毒和清洁的内容损坏的闪存。
In addition, it also comes bundled with a few other, useful security tools, which can be used to scan, disinfect and clean the contents of a corrupted Flash drive.
当前,最常用的网络安全评价方法是风险评估方法,以及利用漏洞扫描工具软件来测试和评估系统的安全程度等。
At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.
如果能够达到健康标准和安全标准,身体扫描仪可以被当做额外有用的工具,这与欧洲现行法律并不冲突。
It considers body scanners, if they meet the health standards and security standards, as a useful additional tool provided they do not contradict existing European legislation.
它有漏洞扫描器和一系列的安全工具。
It has a Vulnerability Scanner and a series of security tools.
它有漏洞扫描器和一系列的安全工具。
It has a Vulnerability Scanner and a series of security tools.
应用推荐