Application layer attacks Application layer attacks are the most common attacks today.
应用层的攻击应用层的攻击是今天最常见的攻击。
The specification does not cover network layer vulnerability information such as network topology, TCP-related attacks, or other network layer issues.
规范中没有涉及网络层漏洞的信息,比如网络拓扑、TCP 相关的攻击,或网络层的其它问题。
WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications.
WAF系统的部署,可以为web应用增加一个外部安全层来检测或防止攻击。
The Gartner Group however estimates that 75% of attacks are at the web application layer, and found out "that out of 300 audited sites, 97% are vulnerable to attack".
Gartner组织估计大约75%的攻击都是在web应用,并且在300个调查的web应用里,97%都是容易被攻击的。
This new edition of DB2 on Rails adds an extra layer of security, thanks to the fact that these "safe" calls are translated into parameterized queries, which are immune to SQL Injection attacks.
DB 2on Rails的这个新版本添加了一层额外的安全性,这要归功于这样一个事实:这些“安全”调用将转换为参数化查询,而参数化查询对SQL注入攻击免疫。
On the other hand, simulated attacks are designed to verify the security performance of Physical Layer and the potential defects in security are mended.
在此基础上,还设计了几种攻击手法用于检验物理层协议的安全性能,并对协议存在的安全漏洞进行了修补。
Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.
安全机制通过增加MAC帧的认证和保密以防御MAC层的安全攻击。
An additional layer of security for protecting data and to minimize successful attacks by malicious programs is provided.
提供用于保护数据以使恶意程序的成功攻击降到最低程度的附加安全层。
Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.
利用数据链路层地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击。
Application layer research is mainly focused on protection against attacks and virus, and managing to realize the combination of application layer, network layer and physical layer.
应用层安全主要研究对攻击、病毒的防护,并设法实现应用层、网络层以及物理层结合的溯源。
There are attacks from the control layer and data layer, comparing Ad hoc with other wireless networks such as WLAN.
对于无线网络来说,管理和策略是关键因素。
There are attacks from the control layer and data layer, comparing Ad hoc with other wireless networks such as WLAN.
对于无线网络来说,管理和策略是关键因素。
应用推荐