在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在试图说明您何时使用它们,及为什么要使用它们之前,这部分先分析这两种方法(总结请参阅下面的表1)。
This section examines the two approaches before attempting to unravel when and why you might want to use each of them (for a summary, see Table 1 below).
说明了用组合分析方法证明代数恒等式的有效性和实用性。
It shows the effectiveness and practicability of the approach to prove algebraic identies with combinatorial analysis.
应用推荐