• The use of plug - ins technology to create a distributed network security scanning system process is presented, too.

    阐述了运用插件技术构建分布式网络安全扫描系统过程

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    youdao

  • At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定