助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全漏洞扫描 的翻译结果: 查询用时:0.025秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

安全漏洞扫描     
相关语句
  vulnerability scanning
     Network vulnerability scanning is the most important part of the information system security.
     网络系统安全漏洞扫描是评估和分析信息系统安全性的基础和安全扫描系统的必要组成部分.
短句来源
     Security vulnerability scanning tools can find a large number of vulnerabilities in computer system,but the division of the severity of vulnerabilties has no relation with the application environment.
     在利用安全漏洞扫描工具对计算机系统进行扫描时,能够发现大量的安全漏洞,但是目前对漏洞严重性的划分没有和应用环境相结合,划分的也不够细致。
短句来源
     The Study of the Technique for Network Security Vulnerability Scanning
     网络系统安全漏洞扫描浅析
短句来源
     A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology.
     从网络攻击的角度提出一个系统安全漏洞的分类,阐述了一个实用的基于这些漏洞分类以及插件技术的网络安全漏洞扫描系统的设计。
短句来源
     The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility.
     网络安全漏洞扫描应充分考虑执行效率和功能独立扩展问题。
短句来源
更多       
  security vulnerability scanning
     The Study of the Technique for Network Security Vulnerability Scanning
     网络系统安全漏洞扫描浅析
短句来源
     Security vulnerability scanning tools can find a large number of vulnerabilities in computer system,but the division of the severity of vulnerabilties has no relation with the application environment.
     在利用安全漏洞扫描工具对计算机系统进行扫描时,能够发现大量的安全漏洞,但是目前对漏洞严重性的划分没有和应用环境相结合,划分的也不够细致。
短句来源
     The security vulnerability scanning technology is able to examine the latent security vulnerability and enables the network administrator to understand in advance where the vulnerability is. In this way the network system will be safe.
     安全漏洞扫描技术能够检测网络系统潜在的安全漏洞,使网络管理员可以预先了解网络的脆弱性所在,从而确保网络系统的安全。
短句来源
     The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility.
     网络安全漏洞扫描应充分考虑执行效率和功能独立扩展问题。
短句来源
     A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology.
     从网络攻击的角度提出一个系统安全漏洞的分类,阐述了一个实用的基于这些漏洞分类以及插件技术的网络安全漏洞扫描系统的设计。
短句来源
  security leak scan
     Research on Network Security Leak Scan and Vulnerability Analysis
     网络安全漏洞扫描与脆弱性分析研究
短句来源
     Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
     网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
短句来源
  “安全漏洞扫描”译为未确定词的双语例句
     1. Analyzing current network securing scanning technology, and describe its strategy and methodology in deep.
     (1)、深入地研究了安全漏洞扫描技术,并对其扫描策略和扫描方法进行了详细地分析,为设计安全漏洞扫描系统打下基础。
短句来源
     (2) It designed a security holes scanning system.
     (2) 设计了一个安全漏洞扫描系统。
短句来源
     Recently,network security technologies include:firewall technology,access control technology,network anti-virus technology,network security hole scan technology,intrusion detection technology,information encryption technology,information confirmation technology and so on.
     网络安全的基本技术目前有 :防火墙技术、访问控制技术、网络反病毒技术、网络安全漏洞扫描技术、入侵检测技术、信息加密技术、信息确认技术等。
短句来源
     (4) Finally, it presents the results of test to prove the feasibility of the system.
     (4) 对本安全漏洞扫描系统进行了测试,证明该系统的设计和实现方案是有效的。
短句来源
     Design of network security scanning system based on plug-in
     基于插件的安全漏洞扫描系统设计
短句来源
更多       
查询“安全漏洞扫描”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  security scan
In this paper, we propose to merge security and testability requirements in a control-oriented design for security scan technique.
      
The proposed security scan design methodology induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level.
      
  vulnerability scanning
An Outsourced Solution might not be suitable for real-time or high performance environments if the agreement includes random vulnerability scanning.
      
DOT continues to conduct weekly vulnerability scanning of all public facing and e-Government Web servers.
      
Existing vulnerability scanning tools do not clearly identify which vulnerabilities are tested and which are not.
      
Expanded the vulnerability scanning to internal servers as well as part of a quarterly compliance review process.
      
SAINT Corporation is the first developer of integrated vulnerability scanning and automated penetration testing software.
      
更多          


Security is important for computer science and to find holes is the first thing to do. Because of some reasons, the network manager can seldom apply a full security test of his system in time. Therefore a security hole scanner will be very useful to them. The analysis of the principle of the hole scanner is firstly put forward in this paper and the design and implementation of a Net-Host combined hole scanner are introduced.

计算机安全问题是在信息化过程中急需解决的问题 ,而安全漏洞的发现对保护系统安全有着非常重要的意义。网络管理人员由于种种原因 ,很难及时、全面地测试系统的安全性。因此 ,设计一种能代替他们进行测试的工具就显得十分必要。本文首先对漏洞扫描的原理进行了分析 ,主要介绍了一种主机与网络相结合的安全漏洞扫描的设计及实现。

The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility. A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology. This system uses the C/S structure, a scanning procedure is running at the server independently as a plug-in and the number of plug-in can...

The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility. A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology. This system uses the C/S structure, a scanning procedure is running at the server independently as a plug-in and the number of plug-in can be increased or reduced conveniently, and the scanning functionality option at the client depends on the vulnerability classification. The C/S communication security is supported by the certificate authentication mechanism.

网络安全漏洞扫描应充分考虑执行效率和功能独立扩展问题。从网络攻击的角度提出一个系统安全漏洞的分类,阐述了一个实用的基于这些漏洞分类以及插件技术的网络安全漏洞扫描系统的设计。该系统采用C/S模型结构,服务器端的扫描程序以独立的插件形式执行,可方便地添加或删除,而客户端漏洞的扫描功能设置则基于漏洞的分类。系统采用证书认证机制来保障C/S交互的安全性。

Network security vulnerability scanner is an important defense technique in network security system. This paper illustrates the necessity why we need the Network-security vulnerability scanner, the concept, the architecture and method of vulnerability scanner are proposed. It also discusses the situation and criteria in network security vulnerability scanners used domestically and abroad.

网络安全漏洞扫描器是近年来网络安全研究的热点。文章说明了网络安全漏洞扫描的必要性 ,给出了网络安全漏洞扫描器的概念和结构 ,概述了多种漏洞扫描的技术 ,最后介绍了网络安全漏洞扫描器的国内外现状及评判标准。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关安全漏洞扫描的内容
在知识搜索中查有关安全漏洞扫描的内容
在数字搜索中查有关安全漏洞扫描的内容
在概念知识元中查有关安全漏洞扫描的内容
在学术趋势中查有关安全漏洞扫描的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社