• With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.

    美国Econolite公司开发StrongPoint网络安全装置最近接受Sword&Shield企业安全公司的智能交通系统(ITS易损性评估渗透性试验

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.

    网络安全方面进一步研究网络脆弱性以及脆弱性安全对策奠定了基础

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.

    为了保障网络信息系统安全,必须网络漏洞探测系统进行深入研究

    youdao

  • In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.

    为了保障网络信息系统安全,必须网络漏洞探测系统进行深入研究

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定