Nmap is a free, open source utility for network exploration or security auditing.
Nmap是一个用于网络检测或安全审计的免费开源工具。
Simulation results show that this method is valid in real security auditing systems.
将此方法应用于实际的安全审计系统,得到了较好的效果。
Code that is identified as transparent does not require a high degree of security auditing.
标识为透明的代码不需要严格的安全审核。
Network security auditing system catches more and more attention of the system administrators.
因此网络安全审计系统开始受到广泛的重视。
Syslog is an operating system administrative logging tool used in systems management and security auditing.
系统日志是操作系统管理员的日志工具,被用于系统管理和安全审核。
Enable security auditing and logging for the database you are using so that you are alerted to any security breaches.
为您使用的数据库启用安全审核和记录,以便违反任何安全性时得到警报。
Another security enhancement is the option to generate security auditing records of WebSphere Application Server administrative actions.
另一个安全增强功能是可以选择生成WebSphereApplicationServer管理操作的安全审核记录。
It is fair comment that the open source community should not be complacent in its security auditing, but there is power in numbers.
公平地说,开放型社区不应自傲于安全监督,而应拥有充分的保安力量。
A broadband access server (BAS) was used as auditing agent to implement a distributed security auditing system on metropolitan area network (DSASMAN).
用宽带接入服务器(BAS)作为分布式审计代理实现城域网(MAN)上的主动式安全审计系统。
This paper studies related technologies and standards of security auditing, designs and implements a security audit system for various types of applications.
本文通过研究安全审计的相关技术和标准,设计并实现了一个针对各类应用系统的安全审计系统。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
Network security auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions.
网络安全审计深入覆盖了商业和开源工具的使用,以协助审计和验证安全策略的假设。
The most that any tool can give you is a snapshot in time, and for a tool to be useful you will need to make security auditing part of normal network maintenance.
任何工具可以给予你的最多是及时的瞬态情况,为了使工具有用,你需要使安全审计成为正常的网络维护工作的一部分。
Obviously, when analyzing the demand and supply issues of audit quality relating to security auditing market in China, we should take the former background as starting point.
显然,对我国证券审计市场相关的审计质量的需求和供给等问题的分析也应当以此为出发点。
This prototype is characterized by its real-time surveillance, centralized management and intelligence auditing. It also provides stronger support for security auditing in network.
本文实现的系统原型具有实时监控、集中管理和智能审计等特点,为网络系统的安全审计工作提供了强有力的支持。
In chapter VI, the significance of Internet content security auditing was described and the overall framework and functions of the ICSA (Internet content security auditing) system were introduced.
第六部分说明了网络内容安全审计的意义,并详细介绍了已实现的内容安全审计系统的总体框架和功能。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
Regular system auditing will also help refine the security policy used for new machine installations as it helps close the feedback loop on what subsystems are actually in use.
正常的系统审计也可以帮助提炼安装新机器时所使用的安全策略,因为它有助于关闭关于实际使用的子系统的反馈循环。
Some platform features include security, transaction auditing, extension mechanisms, notification mechanisms, business rule enforcement, and so on.
一些平台特性包括安全性、事务审计、扩展机制、通知机制、业务规则实施等等。
Things like communication protocol differences, routing and auditing of interactions, security, and so on, can be handled outside of the actual service requester and provider.
像通信协议差异、路由和审核交互、安全性之类的内容可以在实际的服务请求程序和提供程序之外处理。
There are many potential USES for channel exits including auditing, security, compression, conversion, and so on.
通道出口有许多潜在的用途,其中包括审核、安全、压缩、转换等。
Transports authenticate an incoming request based on a user-name password combination and then delegate authorization and auditing to a security service.
传输器基于用户名密码组合认证一个输入请求,然后再将认证和审计委托给安全服务。
The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
Typically an ESB will contain mechanisms for logging, auditing, authentication (security), and management, etc, above and beyond the services listed above.
除了上面列出的服务,ESB通常还要包括记日志、审计、认证(安全)和管理等机制。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
The auditing side of cyber security needs candidates who might not be able to write security programs but can understand how to regulate activity.
比如网络安全的审计方面需要的人手可能不必懂编程,但却要知道如何进行规范管理。
Attributes like threading, instancing, auditing, security and hosting are important regardless of the protocol.
类似线程、实例化、审计、安全与托管等重要特性都不需要考虑协议。
The DB2 UDB auditing facility is an important security tool in the DBA's toolbox.
DB 2UDB审计功能是DBA工具箱中一件重要的安全性工具。
New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.
新的安全特性增加了更深层次的管理、用户治理和审计,从而减少系统漏洞并大大提高开发人员的效率。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
应用推荐