• Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Cloud lock to help users fix vulnerabilities and network security strategy.

    健康服务器66%,健康服务器占比26%。帮助用户及时修复了漏洞补丁网络安全策略项

    youdao

  • Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Network anti G01 help users fix vulnerabilities and network security strategy.

    健康服务器66%,健康服务器占比26%。g 01帮助用户及时修复了漏洞补丁网络安全策略项。

    youdao

  • Changes to hardware or software can easily introduce vulnerabilities that undermine network security.

    硬件软件变化可以轻松地引进漏洞破坏网络安全

    youdao

  • As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.

    作为网络安全研究基础计算机系统脆弱性发现应对等相关工作始终是网络安全研究的焦点之一

    youdao

  • Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    youdao

  • Despite security targets of wireless network, MANET has not only its special security requirement, but also additional vulnerabilities and features pertinent to this networking paradigm.

    移动自组网络除了要达到传统有线网络中的安全目标外,还有自身特殊安全需求而它特性又使之容易遭受各种攻击

    youdao

  • Vulnerabilities is used in some of the damage activities, thus, network security is more and more attention for people.

    个别不法分子利用网络中的一些安全漏洞进行破坏活动由此,网络安全越来越受到人们的重视

    youdao

  • So the security issues of RTP is an important component of IMS security. RTP-related vulnerabilities will take an negative impact on the IMS network.

    因此RTP安全IMS网络安全的重要组成部分RTP脆弱性IMS网络带来安全隐患,研究rtp安全对IMS安全具有重要意义。

    youdao

  • How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security.

    如何发现修补利用计算机漏洞网络攻防研究焦点问题之一

    youdao

  • Source code security audit to detect loopholes in the code, can detect the C, C++, Perl, PHP and Python code errors and security vulnerabilities, network security must engage in to look at.

    源代码安全审计检测代码中的漏洞可以 检测C, C++,PerlPHPand Python 代码中的漏洞安全错误网络安全的一定看看。

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定