The use of plug - ins technology to create a distributed network security scanning system process is presented, too.
并阐述了运用插件技术来构建分布式网络安全扫描系统的过程。
PMMW imaging technology has been applied widely in military affairs and civil applications such as battlefield reconnoitering, anti-terror detecting and security scanning.
无源毫米波成像技术在战场侦察、反恐探测、安检等军事、民事应用领域具有重要的实用价值。
But as the city began random security scanning at middle and high schools yesterday in its latest effort to seize weapons, the gap between school rules and parents' expectations has set off a furor.
但是,当昨天该市开始在中学和高中进行保安随机抽检作为抓获这些“武器”的最后努力时,父母的期望和学校的规章之间的距离掀起轩然大波。
SPEXER 2000 is the worldwide first security radar using the newest radar technology of Active Electronically Scanning Array (AESA).
SPEXER 2000是全球第一个采用最新主动电子扫描阵列技术(AESA)的安全雷达。
The Transportation Security Administration said today that pilots will no longer be subject to scanning or pat-downs.
交通安全部今天宣布,驾驶员将不再遭受扫描或搜身之苦。
Scanning fingerprints adds time as well as security.
扫描指纹在加强了安全性的同时也耗费了时间。
And then there's Google, which says it has made significant efforts to "minimize the security risks on Android" by scanning incoming applications for malware.
接下来是谷歌,该公司表示为了将“Android平台的安全威胁降到最低”,已花费大量精力对层出不穷的应用程序扫描恶意软件。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
Scanning prints at two meters could mean safer security checks.
安检时,在两米之外扫描指纹(进行指纹识别)会更加安全。
It is for this reason that many security companies use retinal scans, or the scanning of the eyes, as a security measure.
这是因为这个原因,许多保安公司使用视网膜扫描,或扫描的眼睛,作为一项安全措施。
Once Security Mechanic is in, it spoofs scanning your system for threats, and tells you you're infected with non-existent threats.
一旦安全技工是,它伪装扫描您的系统的威胁,并告诉您您感染了根本不存在的威胁。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.
毕竟物联网涉及多个层次的安全,需要持续扫描漏洞的技术。
If his team can get its hands on the large amounts of security imagery it needs to feed into its software, Dr Griffin thinks container scanning, at least, might be entirely automated.
格里芬博士认为,如果他的团队能够得到大量安全图像供软件学习的话,至少集装箱扫描可以完全自动化。
The US Department of Homeland Security announced Friday a list of 11 airports to be equipped with full-body scanning machines to better detect possible threats.
美国国土安全部5日宣布,将在11个机场部署全身扫描仪,以加强探测潜在威胁。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
Mainly describes the integration and the update of anti-virus software on the security control units and realized the virus scanning on data of buffering area.
重点描述了安全控制单元中杀毒软件的集成和升级,并实现了对缓冲区中数据的病毒扫描。
To fend off Chinese competitors like Huawei and Xiaomi, it packed the phone with new features, like waterproof technology and iris-scanning for added security.
为了击败华为和小米等中国竞争对手,它在这款手机上集成了众多新功能,诸如防水技术和用于增加安全性的虹膜扫描技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.
当前,最常用的网络安全评价方法是风险评估方法,以及利用漏洞扫描工具软件来测试和评估系统的安全程度等。
Computer simulations and optical scanning experiments show that the presented technique has advantages of the simple authentication process, high PSNR, inexpensive cost and good security.
计算机仿真与光学扫描实验表明,该方法具有认证过程相对简单、解码图像信噪比高、成本低和防伪性能好等优点。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
The cameras are designed for perimeter security and surveillance and feature all-weather rugged housings that are environmentally sealed, as well as 99 preset positions for perimeter scanning.
摄像机具备封闭式环境的全天候坚固外壳以及用于边界扫描的99个预置方位。
The cameras are designed for perimeter security and surveillance and feature all-weather rugged housings that are environmentally sealed, as well as 99 preset positions for perimeter scanning.
摄像机具备封闭式环境的全天候坚固外壳以及用于边界扫描的99个预置方位。
应用推荐