Partly runtime binding: As in the previous case, the signatures of the service operations are known at the development time as well as the network protocol.
部分运行时绑定:与前述情况一样,在开发时就已经知道服务操作的签名和网络协议。
The MuDynamics unit tested the ability of the system under test (SUT) to protect a network from threats with published threat signatures even before patches are applied.
MuDynamics部分,测试了被测系统(SUT)保护网络免受已知木马威胁的能力,甚至是在被测系统打补丁之前。
Because of these features, digital signatures are widely applied to various areas of the network.
正是由于这些功能,数字签名被广泛应用到网络的各个领域。
Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures.
由通信与网络相关的网络协议传输层处理的数据包进行扫描,从使用的签名库签名。
Protects the network from known attack signatures by preventing them from reaching their targets.
保护,防止他们实现其目标,从已知的攻击特征的网络。
Protects the network from known attack signatures by preventing them from reaching their targets.
保护,防止他们实现其目标,从已知的攻击特征的网络。
应用推荐