• 然后深入研究基于网络安全扫描基于主机安全扫描技术分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。

    Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.

    youdao

  • 一些工具Web应用程序安全问题分析代码其他相关性问题扫描代码。

    Some analyze code for security problems for Web applications, and others scan code for dependency problems.

    youdao

  • 网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    youdao

  • 目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    youdao

  • 此外配备一些其他有用的安全工具可以用来扫描消毒清洁内容损坏闪存

    In addition, it also comes bundled with a few other, useful security tools, which can be used to scan, disinfect and clean the contents of a corrupted Flash drive.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

  • 如果能够达到健康标准安全标准,身体扫描仪可以被当做额外有用工具,这与欧洲现行法律并不冲突。

    It considers body scanners, if they meet the health standards and security standards, as a useful additional tool provided they do not contradict existing European legislation.

    youdao

  • 漏洞扫描一系列安全工具

    It has a Vulnerability Scanner and a series of security tools.

    youdao

  • 漏洞扫描一系列安全工具

    It has a Vulnerability Scanner and a series of security tools.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定