Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.
作为信息安全防御技术的对立面,网络渗透技术在信息安全领域里扮演着重要的角色。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.
目前,传统的被动防御技术将无法应对不断增加的大规模网络攻击行为。
The economic losses brought with network attack is also serious, this makes people have to aggravate the more regard the research for network safe defence system and corresponding technology.
由网络攻击而带来的经济损失也越来越严重,这促使人们不得不越加重视对网络安全防御体系及相应技术的研究。
Buffer overflow attack technology is a very efficient attack technology based on network.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.
入侵检测技术就是这样一种动态策略,它通过对网络系统实时监控,来达到动态保护的目的。
Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.
当前网络入侵事件不断发生,使得网络安全管理技术成为当今人们关注的热点。
Network alarm causal correlation technology can help network administrators construct attack scenarios and take timely responses by unveiling the causal relationship of intrusion alarms.
网络告警因果关联技术有助于管理员根据告警之间的因果关系构建攻击场景,及时调整防范措施。
Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.
在不同网络环境条件下,综合使用三种防范ARP攻击的方法,南京工业大学有效的防御了ARP攻击。
This article uses the Honeynet technology together with the organization architecture for network and Detection Web Attack to achieve the target of avoiding the network attack.
通过使用蜜网技术,结合网络的组织架构,检测网站攻击,达到防御网站攻击的目的。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
Program design, network technology, hacker attack and defense, and other e-books.
程序设计、网络技术、黑客攻防等各种电子书。
Discovering software vulnerability is an important part of network attack and defense technology.
软件漏洞挖掘是网络攻防技术的重要组成部分。
Discovering software vulnerability is an important part of network attack and defense technology.
软件漏洞挖掘是网络攻防技术的重要组成部分。
应用推荐