在这种情况下,recipe会在正确的位置添加所有必要的代码,这会显著减少导致运行失败或安全脆弱性的错误机会。
In this case the recipe would add all the necessary code in the right places, greatly reducing the chance of a mistake leading to a runtime failure or security vulnerability.
脆弱性基金将利用现有机制快速和灵活地提供资金,同时通过监控和安全措施来保证资金的正确使用,佐利克说。
The Vulnerability Fund would use existing mechanisms to deliver the funds fast and flexibly, backed by monitoring and safeguards so the money is well spent, says Zoellick.
SCAP可以用来快速查找已知的漏洞,以及持续的安全监测、脆弱性管理和安全政策的承诺评价报告等自动操作。
SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.
我们的道路尤其对行人及骑自行车和摩托车人员来说不够安全,这些人的周围没有类似汽车的保护壳,因此更具脆弱性。
Our roads are particularly unsafe for pedestrians, cyclists and motorcyclists who, without the protective shell of a car around them, are more vulnerable.
软件还可以扫描安全性问题,例如跨站点的脚本以及StructuredQueryLanguage (SQL)注射脆弱性。
The software can also be scanned for security issues, such as cross-site scripting and Structured Query Language (SQL) injection vulnerabilities.
软件脆弱性的本质是利用该脆弱性可以影响系统的安全。
The essence of software vulnerability is to exploit and affect system security.
箱子内的陶塑作品使人马上联想到脆弱性,以此表述人们渴望亲近与保护、信任与安全。
The pottery sculptures inside the box instantly remind people of the frangibility, and thereby expressing mankind's desire for intimity, protection, trust and safety.
网络脆弱性分析是解决网络安全问题的有效手段之一。
Network vulnerability analysis is one of the effective solutions for network security problem.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
然而,天基光电成像遥感设备在军事中的重要性和固有的脆弱性,使其安全与防护问题日益突出。
However, the importance and inherent frangibility of the space-based photoelectric imaging and re-mote sensing device make problem of safety and protection more serious.
文章从计算机网络系统的硬件设施和软件资源两个方面论述了计算机网络安全的脆弱性和潜在威胁。
The fragility of a computer network and the potential threat to the safety of such a network are discussed in the light of the hardware and software resources of a computer network system.
DNS协议在设计之初就没有考虑太多的安全因素,协议本身所存在的脆弱性使得DNS面临着各种威胁。
At its inception, DNS was not designed to be a secure protocol. Because of its vulnerability, DNS faces many threats from a variety of aspects.
类库中的编程错误会公开安全脆弱性,因为类库经常访问受保护的资源和非托管代码。
Programming errors in class libraries can expose security vulnerabilities because class libraries often access protected resources and unmanaged code.
网络环境的复杂性、多变性,以及信息系统的脆弱性,决定了网络安全威胁的客观存在。
Changefulness and the complexity of network environment, as well as the frailty of information system, have decided the objective existence of network safe threat.
作为网络安全研究的基础,计算机系统脆弱性的发现和应对等相关工作始终是网络安全研究的焦点之一。
As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.
然而,正是这个安全网阻碍了市场约束发挥作用,掩盖了日本银行体系长期积累下的脆弱性。
However, it is the safety nets that prohibited the role of market discipline and concealed Japanese banking fragility accumulated through long time.
作为人口高度集聚的人工生态系统,城市生态系统的安全性更加具有脆弱性。
As one of populous artificial ecosystems in the ecology domain, the security of urban ecosystem is more fragile.
然而,网络自身固有其脆弱性,并且中国的网络信息技术起步较晚,给网络安全带来诸多潜在的威胁。
However, due to the connatural frailty of the computer network, as well as the start of China's network and information technology was late, which causes the network security many potential threats.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
若实施金融自由化战略又可能导致经济系统的脆弱性,影响金融安全。
However, if the strategy is put into effect, it might result in fragility of economic system and affect financial security.
脆弱性是网络安全事件的根源。
网络存在安全漏洞的根本原因在于计算机网络系统自身存在脆弱性。
The root of the network security problem is that network itself is vulnerable.
为网络安全方面进一步研究网络脆弱性以及脆弱性的安全对策奠定了基础。
Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.
代码访问安全性还有助于最大限度地减少由于代码中的安全脆弱性而造成的损害。
Code access security can also help minimize the damage that can result from security vulnerabilities in your code.
针对现有选播安全组管理方案的安全脆弱性,采用基于CA机制提出一种新的选播安全组管理解决方案。
To solve the secure weakness in the anycast group management, a solution based on ca mechanism is presented.
由于计算机系统的开放性以及计算机本身安全的脆弱性,导致了计算机安全方面出现许多漏洞,引发了许多计算机犯罪的问题。
There exist security problems due to the openness of computer system and the weakness of computer itself, which leads to many computer crimes.
因此,RTP的安全是IMS网络安全的重要组成部分,RTP的脆弱性会对IMS网络带来安全隐患,研究rtp安全对IMS安全具有重要意义。
So the security issues of RTP is an important component of IMS security. RTP-related vulnerabilities will take an negative impact on the IMS network.
因此,RTP的安全是IMS网络安全的重要组成部分,RTP的脆弱性会对IMS网络带来安全隐患,研究rtp安全对IMS安全具有重要意义。
So the security issues of RTP is an important component of IMS security. RTP-related vulnerabilities will take an negative impact on the IMS network.
应用推荐