• In his article he delves into the details of how potential attackers use to prepare their attacks and how some common web service practices' support 'these threats.

    文章中详细探讨潜在黑客常用攻击技巧,以及一些常见Web服务应用又是如何支持”了这些攻击。

    youdao

  • Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.

    通过实例分析证明了算法模型适合全面分析网络安全性攻击可能采取行为方式

    youdao

  • First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.

    首先系统漏洞潜在攻击攻击目的可能导致的后果等进行安全风险分析评估

    youdao

  • Finjan found the attackers had lured about 90,000 potential victims to their sites, and successfully infected about 6,400 of them.

    安全专家还发现攻击者已经诱骗了大约90,000个潜在用户登录他们网站成功感染6,400个用户。

    youdao

  • Much of the discussion of cyberwar has focused on the potential for a "digital Pearl Harbour", in which a country's power grids and other critical infrastructure are disabled by attackers.

    很多关于网络战争讨论焦点放在“数字珍珠港”的可能性上面,这种情形下面,国家能源以及其它关键基础设施被攻击者弄瘫痪。

    youdao

  • By adding flexibility to the attackers with multiple points of entry, there will be potential for the player to use more tactics and not just brute force, for a more successful engagement.

    通过增加入口方式增加攻城灵活性玩家更多成功交战中将可能使用更多的策略不是

    youdao

  • By adding flexibility to the attackers with multiple points of entry, there will be potential for the player to use more tactics and not just brute force, for a more successful engagement.

    通过增加入口方式增加攻城灵活性玩家更多成功交战中将可能使用更多的策略不是

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定