However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.
但是这种基于识别主机完整性信息的网络用户行为管理技术,不能识别出具有避绕主机完整性检查的攻击行为。
You can use the same data descriptions for distributed and host environments, which reduces overhead and improves data consistency and integrity.
对于分布式的主机环境,您可以使用相同的数据描述,这大大减少了开销,提高了数据的一致性和完整性。
The ANSI T10 standard provides a way to check the integrity of data read and written from the host bus adapter to the disk and back through the SAN fabric.
ANSIT10标准提供一种方法检查从主机总线适配器 (HBA)通过SAN 光纤写到磁盘和读取回的数据的完整性。
These are important questions to ask if you value the integrity of your Web site, the servers that host your site, and the back-end resources upon which these rely.
如果您重视网站、承载网站的服务器以及它们所依赖的后端资源的完整性,则这些问题非常重要。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.
文件系统完整性校验是一种基于主机的入侵检测技术,可以检测出入侵者对主机文件的非法修改。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
Overexpression glucosamine 6-phosphate synthase effect host strain's Cell wall integrity.
④过表达葡糖胺-6-磷酸合酶对宿主菌细胞壁完整性的影响。
The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.
该系统从入侵检测系统和主机系统等多数据源主动收集数字证据,通过完整性算法保证数字证据传输和存贮过程中的完整性。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
应用推荐