vulnerability scanning造句
例句與造句
- armo php : a web application vulnerability scanning platform for php
armophp一個(gè)用針對phpweb應(yīng)用程式的安全漏洞檢查平臺 - and the function of gathering vulnerability information is often provided by network vulnerability scanning tools
而對目標(biāo)系統(tǒng)漏洞信息的獲取,目前主要是通過網(wǎng)絡(luò)漏洞掃描工具實(shí)現(xiàn)的。 - vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of lotus domino
漏洞攻擊掃描有助于識別操作系統(tǒng)或lotusdomino配置中潛在的安全漏洞。 - in the end, this article describes the design and implementation of a network vulnerability scanning system, which names nvs ( network vulnerability scanner )
最后本文設(shè)計(jì)并實(shí)現(xiàn)了一個(gè)采用木馬體系結(jié)構(gòu)的、面向攻擊的網(wǎng)絡(luò)漏洞掃描系統(tǒng)nvs(networkvulnerabilityscanner)。 - then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking . after that, the article pays attention to the attacking technology on vulnerability
然后又進(jìn)一步研究了漏洞攻擊技術(shù),并分析在實(shí)施網(wǎng)絡(luò)攻擊過程中,執(zhí)行網(wǎng)絡(luò)漏洞掃描所面臨的困難。 - It's difficult to find vulnerability scanning in a sentence. 用vulnerability scanning造句挺難的
- then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking . after that, the article pays attention to the attacking technology on vulnerability
然后又進(jìn)一步研究了漏洞攻擊技術(shù),并分析在實(shí)施網(wǎng)絡(luò)攻擊過程中,執(zhí)行網(wǎng)絡(luò)漏洞掃描所面臨的困難。 - and nvs consists of two parts : nvs console and nvs sensor . nvs sensor runs as a trojan horse on an innocent host . an attacker uses nvs console to control nvs sensor to perform vulnerability scanning
nvs執(zhí)行端內(nèi)核是以木馬形式植入第三方“無辜”主機(jī),而本地攻擊者使用nvs控制端控制遠(yuǎn)程執(zhí)行端,對目標(biāo)系統(tǒng)執(zhí)行網(wǎng)絡(luò)漏洞掃描。 - in the risk management system, the risk assessment is the basic and first indispensable step . the risk assessment deals with the results of vulnerability scan and threat recognition with some special methods
在風(fēng)險(xiǎn)管理中,風(fēng)險(xiǎn)評估是最基本的,它根據(jù)漏洞掃描及威脅識別的結(jié)果采用適當(dāng)?shù)娘L(fēng)險(xiǎn)評估方法對被評估系統(tǒng)的安全性做出定量的評判。 - the article primarily describes the implementation of the route detection module of the internet topology sub-system, the internet vulnerabilities scanning sub-system, and the remote control module of attack and control sub-system in the circumstances of windows 2000 and the microsoft visual c + + 6.0
本文圍繞上述目標(biāo)和實(shí)現(xiàn)方法,介紹了網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)子系統(tǒng)中的目標(biāo)網(wǎng)絡(luò)尋徑子模塊,掃描子系統(tǒng),攻擊及控制子系統(tǒng)中的遠(yuǎn)程控制子模塊在windows2000professional平臺上、microsoftvisualc++6.0環(huán)境下的實(shí)現(xiàn)。 - the risk management contains lots of security technology including vulnerability scan, threat recognition, risk assessment and response technology . this paper presents a risk management platform based on the related technologies and the risk management models . the risk management platform consists of three layers including information collect layer, information assess layer and security response layer
本文通過對風(fēng)險(xiǎn)管理相關(guān)技術(shù)以及目前存在的風(fēng)險(xiǎn)管理模型的研究,設(shè)計(jì)了風(fēng)險(xiǎn)管理平臺,將風(fēng)險(xiǎn)管理平臺劃分為三個(gè)層次分別為信息收集層、信息處理層和安全響應(yīng)層,完成從系統(tǒng)安全信息收集、安全信息處理到最后的安全響應(yīng)措施一系列步驟。