• Application layer attacks Application layer attacks are the most common attacks today.

    应用层攻击应用层的攻击今天常见的攻击。

    youdao

  • The specification does not cover network layer vulnerability information such as network topology, TCP-related attacks, or other network layer issues.

    规范中没有涉及网络漏洞信息比如网络拓扑TCP 相关攻击网络层的其它问题

    youdao

  • WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications.

    WAF系统的部署,可以为web应用增加一个外部安全检测防止攻击

    youdao

  • The Gartner Group however estimates that 75% of attacks are at the web application layer, and found out "that out of 300 audited sites, 97% are vulnerable to attack".

    Gartner组织估计大约75%攻击web应用并且300个调查的web应用里,97%都是容易被攻击的。

    youdao

  • This new edition of DB2 on Rails adds an extra layer of security, thanks to the fact that these "safe" calls are translated into parameterized queries, which are immune to SQL Injection attacks.

    DB 2on Rails这个版本添加了额外安全性,这要归功于这样一个事实这些安全调用转换参数查询参数化查询SQL注入攻击免疫

    youdao

  • On the other hand, simulated attacks are designed to verify the security performance of Physical Layer and the potential defects in security are mended.

    基础上,设计了几种攻击手法用于检验物理层协议安全性能协议存在的安全漏洞进行了修补。

    youdao

  • Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.

    安全机制通过增加MAC认证保密防御MAC的安全攻击

    youdao

  • An additional layer of security for protecting data and to minimize successful attacks by malicious programs is provided.

    提供用于保护数据以使恶意程序成功攻击降到最低程度附加安全

    youdao

  • Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    利用数据链路地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击

    youdao

  • Application layer research is mainly focused on protection against attacks and virus, and managing to realize the combination of application layer, network layer and physical layer.

    应用层安全主要研究攻击、病毒防护设法实现应用层、网络以及物理层结合的溯源。

    youdao

  • There are attacks from the control layer and data layer, comparing Ad hoc with other wireless networks such as WLAN.

    对于无线网络来说管理策略关键因素。

    youdao

  • There are attacks from the control layer and data layer, comparing Ad hoc with other wireless networks such as WLAN.

    对于无线网络来说管理策略关键因素。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定