The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
Beyond inspection and analysis, Fiddler also offers the ability to set breakpoints and tamper with data in requests and responses, especially useful for security and input sanitation testing.
除了数据监察和统计分析,Fiddler也支持设置断点,修改请求和响应的数据。这一点在安全性和数据正确性的测试上非常有用。
The key lies in the completion of data processing, analysis, coupling, the premise of the transfer, and the transmission of data must be built on the basis of information security.
其关键在于完成数据的处理、分析、耦合,其前提在“传递”,而数据的传递须建立在信息安全基础之上。
In structure design, data relay, parameters selection of TAT and the correct analysis of output information, so guarantee the security of the project structure design.
在结构设计时,TAT的数据接力、参数合理选取和输出信息的正确分析、判断,是保证工程结构设计安全的关键。
The thesis begins with analysis of system structure, then introduces realization of simulating models, naming, location, security operation of dynamic data, and data consistency.
首先分析其体系结构,然后介绍系统如何实现仿真模型及动态数据的统一命名、定位、安全操作和数据一致性。
This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.
本文首先指出三层MPLSVPN可能受到的安全威胁,然后分析了三层MPLS VPN在数据面、控制面和管理面上的安全性,最后提出保持系统安全的一些建议。
Considering the data flow description in protocol security testing, mutation analysis is introduced based on constructed type algebra, and a new protocol security testing method is proposed.
针对协议安全测试中数据流的描述问题,在构造类别代数的基础上引入变异分析,由此提出了一种协议安全测试方法。
Analysis of real-time financial data, process control, rule observance, security application are fields in which data mining based embedded mobile database can be used.
金融数据的实时分析,过程控制,规章的遵守,安全应用这些都是基于嵌入式数据库的数据挖掘可以应用的领域。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
According to the monitor data analysis which has been carried on the regression method, we can forecast the finally displacement value and the line security condition.
通过对监测数据回归分析,可以预测测点可能的最终位移值和既有线路的安全状况。
Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.
数据包截获机制是网络性能分析工具和网络安全工具的实现基础。
Under the preconditions of sufficiency and security of original data quality features, this article aims to offer original data collection control measures to the analysis of original data collection.
本文就原始数据的质量特征在充分性和可靠性前提下,如何进行原始数据的采集分析,提出原始数据的采集控制措施。
This security audit system mainly consists of three parts: data collection, data analysis and logging.
本文的安全审计系统主要由数据采集、数据分析、日志记录三部分组成。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
And carries on the data analysis appraisal to the income security system implementation effect, simultaneously has given the question which needs to improve in the system.
并对收入保障系统实施效果进行数据分析评价,同时给出了系统中需要改善的问题。
Finally, the development trend is forecasted and some Suggestions relating to big data visualization, multidisciplinary integration, security and privacy, depth analysis etc. are proposed.
提出大数据可视化、多学科融合、安全与隐私、深度分析等发展趋势和相关建议。
The system consists of 3 sub-systems: data management sub-system, data analysis and report sub-system, and system security sub-system.
系统划分为三个子系统:数据管理子系统、数据分析与报表子系统和系统安全子系统。
This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.
此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
This article defines the low-income groups in Beijing, analysis their purchasing power and the ability of housing supply and demanding to access the basic data of the Beijing housing security .
其次结合北京市住房保障方面的最新数据对北京市中低收入家庭的住房及收入状况进行分析,对北京市中低收入群体进行了界定,研究了其购买力及北京的住房供需能力。
Security analysis and market analysis are alike, therefore, in the fact that they deal with data that are not conclusive as to the future.
价值派和技术派与此类似,都是根据历史数据来判断并不绝对相同的未来。
The digital SIPLACE vision system for the entire SIPLACE D-Series platform allows for digital data analysis and processing for faster and reliable component recognition and higher placement security.
整个SIPLACE D 系列平台都配备了SIPLACE数字成像系统,此系统可进行数字化分析和处理,提高了元件识别的速度和可靠性,具有更高的贴装安全度。
We can find that propensity of consumption is highly related to the practices of social security reform, according to the analysis on the time series data from 1981 to 2004.
根据1981-2004我国居民消费倾向的时间序列数据进行的居民消费倾向变动与社会保障实践的关系分析,表明居民消费倾向的变化也与社会保障实践紧密相关;
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
The choice of data sources is directly related to the accuracy of network security situation analysis.
数据源的选择将直接影响到网络安全态势分析的准确性。
Fundamental Analysis is commonly defined as a method of evaluating a specific security in order to determine its intrinsic value by analyzing a host of economic and financial data.
基本分析的定义是,通过分析一系列经济数据和金融数据来评估某个特定金融产品的内在价值。
Fundamental Analysis is commonly defined as a method of evaluating a specific security in order to determine its intrinsic value by analyzing a host of economic and financial data.
基本分析的定义是,通过分析一系列经济数据和金融数据来评估某个特定金融产品的内在价值。
应用推荐