计算机网络攻击与防范的研究就变得越来越重要了。
The research on attack and defensive of computer network become more and more important.
提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。
An attack effect evaluation model of computer network based on network entropy was proposed in this paper.
犯罪分子可以利用计算机网络攻击他人计算机系统、软件、发送垃圾邮件或是窃取资料。
They can be used to attack other systems, host attack tools, send spam, or just steal data.
另外一个来自剑桥大学的报告同意上述加拿大调查员,认为始于两年前的几乎所有的计算机网络攻击都来自于中国。
A separate report from Cambridge University agrees with the Canadians that nearly all of the network's cyber attacks, which began two years ago, originate in China.
在虚拟空间里,这个规则意味着你不能规划一个庞大的计算机网络攻击,即使是一个军事网络,也不能够排除民用网络受到牵连。
In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.
网络内战已经爆发,竞争对手间互相攻击对方的计算机网络,试图去揭发泄露对方现实身份。
Cyber civil wars have broken out, with rivals attacking each others' computers and attempting to discover and reveal their real-world identities.
无线hub使攻击购物者计算机网络成为更好的选择,因为大多数无线hub都禁用了安全特性。
Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.
克拉克和他的同事正在研究云服务是如何用于构建僵尸网络的。僵尸网络是由网络攻击者控制的受感染计算机网络。
Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
“社会工程”的有关计算机或通过向天真的问题,计算机网络用户的信息收集,往往是在计算机网络上进行恶意攻击的第一步。
"Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.
总结了计算机网络安全问题中的安全技术,攻击检测技术的作用、方法。分析了几种典型产品的应用。
The essay mainly introduced the safety problem of safety technology, the function and method of attacking test technology in computer network, analyzed the application of several typical product.
如一个青少年莫理斯舞有了铃中心的计算机网络上的一个帐户,在早的砍劈攻击给予他冗员-使用者状态的地方。
As a teenager morris had an account on the bell LABS 'computer network where early hacking forays gave him super-user status.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
从计算机网络受攻击前后安全特性变化的角度,提出了网络熵的概念。
The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.
敲诈,通过使用妥协的“蛇神”计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.
本文主要从计算机网络安全的概述、攻击网络安全的主要技术手段、计算机网络安全防范措施等方面进行阐述。
This article mainly from the computer work security's outline, the attack work security's major technique method, the computer work safety precaution measure and so on carries on the elaboration.
作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
应用推荐