• The use of plug - ins technology to create a distributed network security scanning system process is presented, too.

    阐述了运用插件技术构建分布式网络安全扫描系统过程

    youdao

  • PMMW imaging technology has been applied widely in military affairs and civil applications such as battlefield reconnoitering, anti-terror detecting and security scanning.

    无源毫米波成像技术战场侦察反恐探测安检军事民事应用领域具有重要的实用价值。

    youdao

  • But as the city began random security scanning at middle and high schools yesterday in its latest effort to seize weapons, the gap between school rules and parents' expectations has set off a furor.

    但是昨天该市开始中学高中进行保安随机抽检作为抓获这些“武器”的最后努力时,父母期望学校规章之间距离掀起轩然大波

    youdao

  • SPEXER 2000 is the worldwide first security radar using the newest radar technology of Active Electronically Scanning Array (AESA).

    SPEXER 2000全球第一个采用最新主动电子扫描阵列技术(AESA)安全雷达

    youdao

  • The Transportation Security Administration said today that pilots will no longer be subject to scanning or pat-downs.

    交通安全部今天宣布,驾驶员不再遭受扫描搜身之苦。

    youdao

  • Scanning fingerprints adds time as well as security.

    扫描指纹在加强了安全性的同时也耗费了时间

    youdao

  • And then there's Google, which says it has made significant efforts to "minimize the security risks on Android" by scanning incoming applications for malware.

    接下来谷歌公司表示为了将Android平台安全威胁降到最低”,花费大量精力对层出不穷的应用程序扫描恶意软件。

    youdao

  • Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • Scanning prints at two meters could mean safer security checks.

    安检时,米之外扫描指纹(进行指纹识别)更加安全。

    youdao

  • It is for this reason that many security companies use retinal scans, or the scanning of the eyes, as a security measure.

    是因为这个原因许多保安公司使用视网膜扫描扫描眼睛作为一项安全措施

    youdao

  • Once Security Mechanic is in, it spoofs scanning your system for threats, and tells you you're infected with non-existent threats.

    一旦安全技工伪装扫描系统威胁告诉感染根本不存在的威胁。

    youdao

  • Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.

    主机安全成为计算机用户面临紧迫问题,主机漏洞扫描技术就是主机安全提供保证的一项重要的安全技术

    youdao

  • After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.

    毕竟物联网涉及多个层次安全需要持续扫描漏洞技术

    youdao

  • If his team can get its hands on the large amounts of security imagery it needs to feed into its software, Dr Griffin thinks container scanning, at least, might be entirely automated.

    格里芬博士认为如果团队能够得到大量安全图像软件学习的话,至少集装箱扫描可以完全自动化

    youdao

  • The US Department of Homeland Security announced Friday a list of 11 airports to be equipped with full-body scanning machines to better detect possible threats.

    美国国土安全部5日宣布,将在11个机场部署全身扫描仪,加强探测潜在威胁。

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    youdao

  • Mainly describes the integration and the update of anti-virus software on the security control units and realized the virus scanning on data of buffering area.

    重点描述了安全控制单元杀毒软件集成升级实现了缓冲区数据病毒扫描

    youdao

  • To fend off Chinese competitors like Huawei and Xiaomi, it packed the phone with new features, like waterproof technology and iris-scanning for added security.

    为了击败华为小米中国竞争对手在这款手机上集成了众多功能诸如防水技术用于增加安全性虹膜扫描技术。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    youdao

  • At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    youdao

  • Computer simulations and optical scanning experiments show that the presented technique has advantages of the simple authentication process, high PSNR, inexpensive cost and good security.

    计算机仿真光学扫描实验表明方法具有认证过程相对简单、解码图像信成本防伪性能等优点

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • The cameras are designed for perimeter security and surveillance and feature all-weather rugged housings that are environmentally sealed, as well as 99 preset positions for perimeter scanning.

    摄像机具备封闭式环境全天候坚固外壳以及用于边界扫描的99个预置方位

    youdao

  • The cameras are designed for perimeter security and surveillance and feature all-weather rugged housings that are environmentally sealed, as well as 99 preset positions for perimeter scanning.

    摄像机具备封闭式环境全天候坚固外壳以及用于边界扫描的99个预置方位

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定