Software security practitioners have struggled to get past this mindset.
软件安全的实践者们已经在努力跨越这种心态。
The fourth category is evaluating software security and vulnerabilities.
第四类是软件安全漏洞评估。
Buffer overflow attacks are one of the most notorious software security problems.
缓冲区溢位攻击是一种最恶名昭彰的软体安全问题。
I've also added a chapter that specifically addresses how to test for software security bugs.
我还增加了专门的一章,阐述怎样检测软件安全问题。
Most discussions of software security concentrate on the applications themselves or the data they contain.
大部分软件安全性的讨论都集中在应用程序本身或其中包含的数据上。
Network security is very important in the construction of network, it includes hardware security and software security.
网络安全是网络建设中的重要内容。网络安全包括硬件安全和其上的软件的安全。
When I wrote the first edition of software Testing, software security issues were just beginning to make the headlines.
当我写《软件测试》第一版的时候,软件安全问题刚刚引起注意。
In this column we've introduced you to buffer overflows, which are probably the worst software security problem of all time.
在本专栏中,介绍了缓冲区溢位,它永远可能是最糟的软体安全性问题。
It realizes software security property modeling with the method of MDA, and reduces risk and cost of later development period.
利用MDA方法进行软件安全属性的建模,降低后期开发的风险与成本。
So, how early to detect loopholes in the software system, the software security field is now an urgent need to solve problems.
所以,如何提前检测出软件系统中存在的漏洞,是现在软件安全领域急需解决的问题。
The authors then offer an example of security violation, using a traditional analogy that likens software security to home security.
作者接下来提出了关于违反安全的一个例子,使用传统的推理把软件安全比作成家庭安全。
The list is the result of collaboration between the SANS Institute, MITRE, and “ many top software security experts in the US and Europe”.
这个列表是SANS学院、 MITRE以及“美国和欧洲很多顶级软件安全专家”共同合作的成果。
The software security assurance framework used the principle of system safety engineering and based on software engineering thinking.
通过分析软件安全领域存在的问题,以软件工程思想为基础,运用系统安全工程的原则,提出一个软件安全性保障框架。
In the past few years, software security and software security testing have become some of the hottest topics in software development.
在过去几年中,软件安全性和软件安全性测试在软件开发过程中已成为了热门话题。
TransformIT enhances software security by preventing tampering and hacking attacks that target keys used within software applications.
转换IT通过防止篡改和黑客攻击应用软件中的目标钥匙来提高软件安全保护。
Vulnerability is a serious menace to software security, so vulnerability detection has important meanings for improving software security.
漏洞是软件安全的一个严重威胁,如何检测软件中存在的漏洞对提高其安全性具有重要的意义。
My intention is to demonstrate what software security is by demystifying common terminology and providing realistic examples of typical security exploits.
我的目的是通过阐明公共术语并且提供一些典型的安全性使用的现实实例来说明什么是软件安全性。
Advancement in reverse engineering field upgrades the ability to analyze software, and on the other hand, it brings more challenge to software security.
逆向工程领域的进步,一方面提升了软件分析能力,另一方面,给软件安全带来更大的挑战。
According to the site, vulnerability phyla are classified into "seven plus one" pernicious kingdoms presented in the order of importance to software security
根据这个站点的分类,任何一个漏洞”门“都可以归类到下面这个”7+1“个的致命”界“,下面的些”界“的先后顺序是按照影响软件安全的程度从高到低排序的。
IDA is the Interactive disassembler: the world's smartest and most feature-full disassembler, which many software security specialists are familiar with.
IDA是世界上最敏捷和多功能的反编译工具,被众多软件安全专家所熟知的交互的反汇编工具。
The security zone is divided into vertical and horizontal sections with professional industrial control equipment and software security, as shown in figure 2.
对安全区域划分的纵向各层和横向各区配备专业的工业控制安全设备和软件进行安全防护,如图2所示。
Every year, companies spend vast sums getting software security staff to incidents at a branch office before they can even start investigating computer crimes.
每年,各大企业都要投入巨额资金下令各部门相关员工维护软件系统的安全,从而使犯罪分子的网络犯罪计划从一开始就落空。
Unfortunately, when it comes to addressing software security, traditional testing approaches, and the traditional testing mindset, fall far short of what is required.
不幸的是,在解决软件安全性方面,传统的测试方法和思路,距离要求相差甚远。
With the hackers' attacks changing from the desktop to embedded system, hardware and software security decision are leaded the whole design of the embedded systems.
随着骇客的攻击目标从台式计算机转向嵌入式系统,硬件和软件的安全决策将主导着嵌入式系统设计的流程。
Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.
这样,能够识别签名的工具就可以有选择地为您授予软件安全特权,这是其他文件做不到的,它还可以检测代码是否被篡改过。
Software security testing is an important guarantee of software safety and quality, and is gradually becoming an inevitable step in software development life circle.
软件的安全性测试是软件安全和软件质量的重要保障,也逐渐成为软件生命周期中必不可少的一环。
So we started to get requests from European companies from individuals, from small companies, because who was going to work with an unknown Russian software security company, in 94?
谁会在94年和一个不知名的俄罗斯软件安全公司做生意?所以我们一开始就从欧洲的公司、从个人、从小型公司接订单。
To combat this lack of knowledge within the test organization, tools such as penetration test and fuzz test have become popular weapons in the ongoing fight against software security exploitation.
为了解决测试团队这方面知识的缺乏,贯穿测试和模糊测试这样的工具逐渐流行起来,用作软件安全性的开发。
In this paper, we briefly discuss the problem of software security and the characteristics of security testing. Several kinds of mature technology of security testing are detailed introduced.
简单阐述了软件安全问题和软件安全性测试的特点,主要介绍了当前国内外较为成熟的安全性测试技术。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
应用推荐