• Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.

    审计日志多种入侵检测系统重要信息来源因而审计系统就成为黑客攻击者对付的主要目标

    youdao

  • So the effective data transfer method must be taken into account during the design of the embedded testing tool to upload data and reduce the intrusion to the target system as many as possible.

    因此嵌入式分析测试工具设计上也必须考虑有效数据上传方法,解决数据信息的传输问题,并且尽量减小被测程序的影响。

    youdao

  • So the effective data transfer method must be taken into account during the design of the embedded testing tool to upload data and reduce the intrusion to the target system as many as possible.

    因此嵌入式分析测试工具设计上也必须考虑有效数据上传方法,解决数据信息的传输问题,并且尽量减小被测程序的影响。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定