助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[1]页 共[12]条 当前为第1条到12条
 

相关语句
vulnerability scanning
An Outsourced Solution might not be suitable for real-time or high performance environments if the agreement includes random vulnerability scanning.
      
DOT continues to conduct weekly vulnerability scanning of all public facing and e-Government Web servers.
      
Existing vulnerability scanning tools do not clearly identify which vulnerabilities are tested and which are not.
      
Expanded the vulnerability scanning to internal servers as well as part of a quarterly compliance review process.
      
SAINT Corporation is the first developer of integrated vulnerability scanning and automated penetration testing software.
      
SAINT's integrated interface is easy to use with tabs for both vulnerability scanning and penetration testing.
      
Swarm is a self-contained network device that performs continuous vulnerability scanning on a network.
      
The vulnerability scanning then goes through chosen list of addresses and probes for vulnerabilities.
      
The advantages of these services are that they administer the vulnerability scanning and are specialists in this providing this kind of service.
      
Vulnerability scanning is only the first step in proactive network security.
      
Vulnerability scanning and penetration testing provide a snapshot of the network's security at a specific point in time.
      
While network vulnerability scanning is an important tool in proactive network security, penetration testing is the next step.
      
 

首页上一页1下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社