This paper brings forward to a quantitative fusion model aimed at target host security.
该文提出了一种针对主机安全性的量化融合模型。
Frequently, the host security of those systems will prevent attackers from gaining control over a host.
那些系统的主机安全性经常会阻止攻击者获得对主机的控制权。
The security of mobile agent can be classified into two catalogs: host security and agent security.
移动代理的安全问题分主机安全与代理安全两类,综述了后一种安全问题。
Active alarm, 115db, 12VDC, and combined with the host security alarm with the emergency alarm function.
与安防报警主机联用,具有紧急报警功能。
The paper presents a model of host (server) security trying to check attacks from both outsiders and insiders and to increase host security in every aspects.
文章提出一种主机安全的模型框架,力图同时防范来自内、外部的攻击,全面增强主机安全。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
Note: if you have configured a remote CEI server, you must modify the CEI options to specify the remote host name, RMI port and security Settings.
注意:如果您配置了远程CEI服务器,则必须修改CEI选项,以显示远程主机名、R mi端口和安全设置。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
Moscow has threatened to target its missiles at former Warsaw Pact countries that host western military facilities, saying the U.S. missile shield plans threaten Russian security.
莫斯科方面称,美国的导弹防御计划威胁了俄罗斯的安全,并威胁要将其导弹对准这些拥有西方军事设备的从前的华沙条约国家。
So after that, the FS agent works correctly even if all security servers become unavailable regardless of whether the Cached on Host option is enabled or not.
在此之后,即使所有安全服务器不可用,或者没有启用Cached onHost选项,FS代理都能够正常工作。
Specific to Version 6.1, there is a new security infrastructure in that is "secure by default," and includes certificate generation (with host names).
对于Version 6.1来说有点特殊,它具有一种“缺省安全”的新的安全基础结构,并且包括了证书的生成(使用主机名)。
If you decide on a dedicated security monitoring Web service as the host, keep in mind that this is not the same thing as a centralized security monitoring Web service.
如果您决定采用作为主机的专用安全监视Web服务,务必记住这与集中的安全监视Web服务不是同一回事。
Seven years after Delhi won the right to host the event, plans are not even finalised for crucial matters including security and medical care.
在新德里取得举办权7年之后,安全、医疗等重要问题的方案竟然还没有敲定。
When you apply an online policy to a directory on a host by using the Management Console, the policy is saved in the security server and is sent to the FS agent on the host.
当您使用ManagementConsole对主机上的目录应用在线策略时,该策略将保存在安全服务器并发送给主机上的FS代理。
Suppose you host your Web application on a "minority" operating system; you might rely on OpenBSD for its security, for example.
假设您在一个“非主流”操作系统上托管Web应用程序;比如,您可能会依赖OpenBSD来保证安全性。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
As the two development teams and project managers meet, weekly, they review Security, Schemas, Standards, data transformation requirements, and a host of other integration requirements.
随后两个公司的开发人员和项目经理们会每周碰面,就安全、计划、标准、数据转换以及其他一揽子需求进行讨论磋商。
Depending on the security model of your host, you might best do this as sudo stunnel...
根据主机的安全性模型,您最好是执行下面的命令:sudostunnel…。
Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
When a secfsd process starts, all policies related to the host are retrieved from the security server via a VMD process, and the policies are cached in memory.
当secfsd进程启动时,与主机相关的所有策略都通过vmd进程从安全服务器获取,并且策略被缓存到内存中。
Scuffles between torch bearers and protesters in cities including London and Paris have forced host nations to mount tight security operations to protect the torch on its journey.
在伦敦和巴黎等城市,火炬手和抗议者之间的混战促使(火炬传递)举办国施行严密的安全措施,以保护旅途中的圣火。
Scuffles between torch bearers and protesters in cities including London and Paris have forced host nations to mount tight security operations to protect the torch on its journey.
在伦敦和巴黎等城市,火炬手和抗议者之间的混战促使(火炬传递)举办国施行严密的安全措施,以保护旅途中的圣火。
应用推荐