It's really fast network scanner.
这是非常快的网络扫描器。
This text is covering the design of the the scanner's principle, network scanner detailed introduction in proceeding.
本文从扫描器的原理、网络扫描器的设计进行详细的介绍。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
For, if the methods Dr Ehrsson and Dr Blanke have come up with can be reproduced on volunteers inside a brain-scanner, then it might be possible to study the neurological network involved.
因为,如果艾尔逊博士与布兰科博士所试验的方法能够用于大脑放射性扫描仪里对志愿者进行复制,那么这种方法就可能被用于研究相关联的神经网络组织。
The paper presents a scanner color management model based on BP neural network and the analysis of color rendering principle of scanning objects.
本文在分析扫描物呈色原理的基础上,提出了一种基于BP神经网络的扫描仪色彩管理模型。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
The network vulnerability scanner based on port scanning and plugin is proposed in this article.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.
然后深入研究了基于网络的安全扫描与基于主机的安全扫描两种技术,并分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
We sell the ROV scanner through a global distribution network of resellers, system integrators and developers, as well as directly to consumers via our ecommerce web site.
我们的ROV扫描仪远销世界各地,全球分销网络覆盖中间商、系统组装企业和开发企业,也通过电子商务方式直接出售给终端用户。
Proxy scanner can scan network up to 10,000 IP addresses per second.
代理扫描仪可以扫描网络可达每秒10,000IP地址。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
In network security, the vulnerability scanner will find the hidden vulnerability.
在网络安全中漏洞扫描起着发现安全隐患的作用。
In network security, the vulnerability scanner will find the hidden vulnerability.
在网络安全中漏洞扫描起着发现安全隐患的作用。
应用推荐