• Analyzes the principles of network security scan, categories the techniques used in a scan process, presents the concept and protocols each technique derives from.

    分析网络安全扫描原理,对扫描使用的主要技术进行了分类并阐述了每种技术原理协议特性。

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    youdao

  • Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.

    然后深入研究基于网络安全扫描基于主机的安全扫描两技术分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

  • Scan and assess the overall security posture of devices as they attempt to log onto your network.

    扫描评估整体安全姿态装置因为他们试图登录网络

    youdao

  • Scan and assess the overall security posture of devices as they attempt to log onto your network.

    扫描评估整体安全姿态装置因为他们试图登录网络

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定