In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
While not every developer can be a security expert, all developers should know enough to perform some basic network and traffic analysis and to build rudimentary security into their applications.
并非所有开发人员都是安全专家,但所有开发人员都应该了解足够多的知识,执行某些基本的网络和流量分析,并在其应用程序内构建基本的安全性。
Security is a multi-faceted problem that requires close analysis of all the vulnerable factors in a business infrastructure.
安全是一个涉及多方面的问题,需要对业务基础设施中所有容易受到危害的因素加以分析。
Thus begins a studious and academic analysis of the fun, happy, bouncy, up-beat song "Lookin 'Out My Back Door" as it applies to the topic of Web security.
因此,我们首先从适用于Web安全性主题的方面入手,对有趣、愉快、活泼、乐观的歌曲“小心我的后门(LookinOut My Back Door)”进行认真的学术分析。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
Federal employees' job security is so great that workers in many agencies are more likely to die of natural causes than get laid off or fired, a USA TODAY analysis finds.
《今日美国》的一项调查发现,联邦雇员的工作保障率如此之高,以至于在许多机构,员工被解雇的几率比自然死亡的几率还低。
Risk analysis is a method of identifying risks and assessing potential damages that could occur to justify security controls and safeguards.
风险分析是一种标识风险和评估可能会出现的潜在损失的方法,用于为安全控制和保障措施提供依据。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.
CLASP过程也介绍了一些新的活动,这些工件是完全文档化的,支持样例和模板。
The latest is voice risk analysis (VRA), which, among others, Harrow Council in London is testing [font=Arial]as a way of identifying fraudulent claims for social-security benefits[font=Arial].
声音危险性分析(VRA)是最近的技术发明。 和其他此类发明一样,[font=Arial]伦敦的Harrow理事会正在测试一种对社会安全有利的测试说谎的方法[font=Arial]。
In this paper, a deep analysis was made from five angles on the design of China's social security tax system based on the traditional four-principle rule.
本文在分析我国社会保障税制设计应遵循四个原则的基础上,就该税制要素设计的五个重要方面问题进行了详细研讨。
Based on analysis of transaction security, a secure transaction model is given. Moreover, a correctness criterion for secure transactions, secure conflict serializability (SCSR) is proposed.
在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准-安全冲突可串行化(SCSR)。
This paper first introduces principles of synchronous and asynchronous identification based on time and events, and then gives a through analysis of security in dynamic identification techniques.
简要介绍基于时间、基于事件同步、非同步认证原理,分析了动态认证技术安全性。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
Analysis shows that the proposed scheme satisfies all security properties of the strong proxy signature scheme and does not need a secure channel.
分析表明所提方案能够满足强代理签名方案的安全需求,同时不需要使用安全信道。
To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.
为了抵抗原始签名人的伪造攻击,改进了代理签名密钥的生成过程,并对改进的方案进行了安全性分析。
A security and reliability analysis model of route project (include railway and highway) in debris flow regions.
泥石流地区铁路(公路)线路的安全性与可靠度分析模型。
The stress of the thesis is the research on the structure and the management mode of the ITS VCIP and carrying through a security demand analysis based on the whole VCIP.
本文的重点是对ITS 虚拟共用信息平台的结构和管理模式进行研究,把虚拟平台作为一个密切联系的整体来进行安全需求分析。
According to the analysis of the security demand of multicast communication, a multicast key management scheme based on key matrix is proposed.
该文在分析组播通信安全需求的基础上,提出一种基于密钥矩阵的组播密钥管理方案。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.
提出了一个静态分析,动态验证的安全漏洞检测模型。
Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.
串空间模型吸收了前人的研究成果,是分析安全协议的一种实用、直观和严格的形式化方法。
In order to deal with the security of SIFANG CITY under vibratile load of busses, this paper does a simulative analysis for it with ANSYS.
文章针对明孝陵四方城在车辆振动荷载下的安全性问题,应用有限元软件ANSYS进行了数值模拟分析。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
This paper presents a new information security management model based on an analysis of the existing information security management models and information security requirements of the organization.
在分析现有信息安全管理模型的基础上,根据组织机构的信息安全要求提出一个新的信息安全管理模型。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
应用推荐