• 首先介绍网络安全攻击基本概念网络安全测试的一般方法

    First. this paper introduces the basic concepts of network security attacking and security testing methods.

    youdao

  • 最后论文介绍网络安全产品集成测试平台,并给出了平台框架设计与实现方法。

    Finally, the design of the integrated test platform of the network security products is presented.

    youdao

  • 美国国家安全需要网络安全专家强化更新网络防卫进行渗透测试”来盘查安全漏洞,密切注意任何网络攻击迹象

    The NSA needs cyber security experts to harden networks, defend them with updates, do "penetration testing" to find security holes and watch for any signs of cyber attacks.

    youdao

  • 测试网络安全评估系统己实现功能模块

    The tests on the functions of the available modules for network security risk system are made in this paper.

    youdao

  • 测试最后阶段增加网络安全监控全面增强软件质量可靠性节省后期维护费用开销

    Increased network security monitoring in the final stage of testing, in order to enhance the reliability of software quality fully and cost savings in maintenance costs later.

    youdao

  • 本文最后搭建了一个测试平台远程控制网络安全参数配置三方面对原型系统进行测试

    Finally, a test platform is built to test the prototype system in terms of remote control, network security and network parameter configuration.

    youdao

  • 电信设备实施进网检测网络安全保障之一,针对电信接入网设备入网检测遵循标准以及项目测试等予以介绍

    This article gives an introduction to the standards should be followed and the project test should be made for the NAL test to telecom access network equipments.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定