助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   网络漏洞扫描 的翻译结果: 查询用时:0.342秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

网络漏洞扫描
相关语句
  network vulnerability scanning
     The Research and Design of Network Vulnerability Scanning System
     网络漏洞扫描系统的研究与设计
短句来源
     In the end, this article describes the design and implementation of a network vulnerability scanning system, which names NVS (Network Vulnerability Scanner).
     最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(Network Vulnerability Scanner)。
短句来源
     Design and Implementation of Agent-based Network Vulnerability Scanning System
     基于Agent的网络漏洞扫描系统的设计与实现
短句来源
     Based on the model of PPDR(Policy Protection Detection Response),integrated the technologies of Firewall,IDS(Intrusion Detection System),Network Vulnerability Scanning and Honeynet, a kind of new network security model based on dynamic and active defense is proposed.
     基于PPDR(PolicyProtectionDetectionResponse)模型,综合防火墙、入侵检测、网络漏洞扫描、密罐等技术,笔者提出了一种动态、主动防御的网络安全管理模型.
短句来源
     Research on Extensible Policy-Driven Network Vulnerability Scanning
     策略驱动的可扩展网络漏洞扫描研究
短句来源
更多       
  network vulnerabilities scanning
     Design and Implementation of Network Vulnerabilities Scanning System
     网络漏洞扫描系统的设计及实现
短句来源
  network security scan
     The Design of Network Security Scan System
     网络漏洞扫描系统的设计
短句来源
     An effective Network Security Scan system,which based on the simulation to the hacker's attack activities, and the LINUX and WINDOWS,was deigned. It used the structure of Client/Server and the mechanism of distributed simultaneously to improve the scan speed.
     在模拟黑客攻击模型的基础上,综合采用Windows和Linux平台作为扫描基础平台,采用客户端/服务器架构,利用分布并发机制设计了一个高效网络漏洞扫描系统.
短句来源
  “网络漏洞扫描”译为未确定词的双语例句
     Based on the model, the network vulnerability scanner security management system was designed and realized.
     并以该模型为基础,对网络漏洞扫描系统的安全管理系统进行了设计与实现。 本文的主要工作包括:
短句来源
     Function Analysis and CIM Modeling of Network Vulnerability Scanners
     网络漏洞扫描系统的功能分析与CIM建模
短句来源
     The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
     本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
短句来源
     Finally, the dissertation introduced the design and realization of the network vulnerability scanner management system, which included the design for the system architecture based on CORBA (CORBA Object Request Broker Architecture) technology, the realization of CIM models on CORBA platform, the design for the management agent, and the method design for the information exchange on XML (extensible Markup Language), then realized a network vulnerability scanner management system prototype.
     3.设计和实现了网络漏洞扫描系统的安全管理系统。 主要包括基于CORBA分布计算技术的安全管理系统结构设计、网络漏洞扫描系统的CIM模型在CORBA平台上的实现、管理代理设计和基于XML(eXtensible Markup Language)的管理信息交换方法设计等,并实现了一个网络漏洞扫描系统的安全管理系统原型。
短句来源
     This paper discusses the frame and the working principles of the network vulnerability scanner system and introduces a typical network vulnerability scanner—Nessus, with the emphasis on its frame, the scanning process, the server module structure and the plugin download process.
     主要介绍了网络漏洞扫描系统的结构以及工作原理,并介绍了一种典型的网络漏洞扫描器——Nessus。
短句来源
更多       
查询“网络漏洞扫描”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  network vulnerability scanning
While network vulnerability scanning is an important tool in proactive network security, penetration testing is the next step.
      


This paper analyzes the importance of network vulnerabilities scanner in the fields of network security. The design idea and the key programming technology based on Windows Socket of a network vulnerabilities scanner are given.Also,a method scanning Intranet from outside through HTTP and Socks5 proxy is proposed.

分析了网络漏洞扫描器在网络安全领域的重要作用,给出了一种网络漏洞扫描器的设计思想及基于Windows Sockets编程实现的关键技术,同时提出了一种使用HTTP和Socks5代理连接方式实现对内部网络进行漏洞扫描的方法。

Computer Network Security is the most important part of the information security.Because of the complicated network and rapid development of computer network,no one can assure the non-existing of vulnerability.System administrator needs to receive the up-to-the-minute information with the new technology to avoid the hidden peril.With the development of Internet,the research on Network Security Technology has made rapid progress,among which network vulnerability scanning is the key ones.By studies on the development...

Computer Network Security is the most important part of the information security.Because of the complicated network and rapid development of computer network,no one can assure the non-existing of vulnerability.System administrator needs to receive the up-to-the-minute information with the new technology to avoid the hidden peril.With the development of Internet,the research on Network Security Technology has made rapid progress,among which network vulnerability scanning is the key ones.By studies on the development status of network vulnerability scanning,summering the scanning methods.Discussing detailly regarding the key technology,such as Host Discovery Techniques,Resource discovery Techniques,Probing objective service techniques,detecting remote host operation system type,etc..and also analyzing the current scanning technologies and its future development.The purpose is helping the system administrator with network vulnerability scanning to get the node information so as to ensure the continuity and reliability of network service.

计算机网络安全是信息安全至关重要的一个环节 ,由于计算机网络系统的复杂性和网络技术的高速发展 ,无法保证网络系统是安全免疫的。网络漏洞扫描技术利用最新的网络安全技术以及时取得网络系统安全状况的最新信息 ,防止重大安全隐患的发生。同时协助网络管理者能够以最新的网络扫描技术及时有效地取得网络节点信息 ,分析网络系统的安全现状 ,以最大限度地保证网络服务的可靠性、持续性。

To solve the problem of vulnerability in the security of the network information system, a system scarring and detecting the vulnerability in the host and network was designed , using the principle of the network safe scan and the common scan technique, which main function module was described too.

针对网络信息系统安全漏洞问题,利用网络安全扫描原理及常用扫描技术,设计了一个基于 主机和网络的漏洞扫描与检测系统,并对其主要功能模块进行了描述。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关网络漏洞扫描的内容
在知识搜索中查有关网络漏洞扫描的内容
在数字搜索中查有关网络漏洞扫描的内容
在概念知识元中查有关网络漏洞扫描的内容
在学术趋势中查有关网络漏洞扫描的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社