• Second, the security detection technology, mainly through intrusion detection technology.

    安全检测技术主要通过入侵检测技术实现。

    youdao

  • The invention discloses a high-speed switching valve and a security detection system using the high-speed switching valve.

    发明公开一种高速开关使用高速开关阀的安全检测系统

    youdao

  • The security detection system comprises a gas supply gas circuit and the high-speed switching valve connected in series in the gas supply gas circuit.

    安全检测系统包括供气串联供气气路中的前述高速开关

    youdao

  • At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Most organizations think of threat detection and threat denial but rarely do they plan, with a qualified security professional, what to do if or when their systems are breached.

    大多数组织都考虑到了威胁检测威胁拒绝很少为此作出规划对于名合格安全专家如果系统遭到破坏怎么办。

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

  • Threat detection rules and security policy enforcement are needed.

    需要威胁检测规则执行安全策略

    youdao

  • Making files immutable is often done as part of a security or intrusion detection effort.

    使文件不可通常安全或者入侵检测工作一部分

    youdao

  • For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.

    为了加强安全可以考虑所有机器上安装配置入侵检测系统(IDS),例如Snort

    youdao

  • Intrusion detection and audits of security logs.

    入侵检测以及安全日志审核

    youdao

  • Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    youdao

  • A range of other features that are still in the design stage (microformat detection, inspecting security information, etc.)

    一系列设计阶段其它特性(微格式探测检测安全信息)。

    youdao

  • It's true that both intrusion detection and Snort usage extends well beyond Web sites and into larger network security issues.

    确实入侵检测Snort使用超越了Web站点本身,延伸更广泛网络安全问题

    youdao

  • Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.

    使用Acegi安全性可以应用程序提供全面身份验证授权基于实例的访问控制通道安全和人工用户检测功能。

    youdao

  • As threats gets more complex to avoid detection, PC Tools Internet Security responds with new technology to stay one step ahead.

    随着威胁越来越复杂避免被发现PC工具互联网安全回应技术市场上领先一步

    youdao

  • The new detection technology of temperature and humidity parameters conduces to protection of security, increases productivity, and improves product quality in these areas.

    新的湿度参量检测技术这些领域应用有益于保障安全提高生产效率改善产品质量

    youdao

  • Whether it is browser security protection, code library management, and even the detection of duplicate files stored in the media, hashing technology plays an important role.

    无论是浏览器安全保护代码管理乃至检测存储介质重复文件散列技术都在其中发挥重要作用。

    youdao

  • At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.

    模型动态策略管理基础,形成一个防护检测响应为一体的完整安全体系从而主机系统实施综合安全保护

    youdao

  • Hoglund, 38, is widely respected in the computer security world for his expertise with "rootkits," software that facilitates privileged access to a computer while evading detection.

    霍格·伦德现年38岁,因对“rootkit”(该软件可在避开侦测的同时轻松获取计算机的访问权限)的了如指掌而计算机安全领域里广受尊敬。

    youdao

  • Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.

    信息安全问题日益突出互联网中,入侵检测技术以其主动防御特性,得到越来越广泛的重视和应用。

    youdao

  • The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.

    基于防御-检测-响应-恢复代理服务器安全模型防御、检测系统、响应系统、恢复系统专家系统组成。

    youdao

  • The new advances in fast detection techniques of transgenic farm produce bacilli toxin microbe residual pesticide and antibiotic quality and security control of farm produce in2005are put forward.

    摘要论述了2005年转基因农产品细菌毒素微生物残、兽农产品品质安全三个方面快速检测技术进展

    youdao

  • Intrusion detection technique, which as a kind of solution of protecting network security, has been paid more and more attention by people.

    入侵检测技术作为保护网络安全解决方案越来越受到人们重视

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定