助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞扫描 的翻译结果: 查询用时:0.046秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
安全科学与灾害防治
更多类别查询

图标索引 历史查询
 

漏洞扫描     
相关语句
  vulnerability scanning
     Network vulnerability scanning is the most important part of the information system security.
     网络系统安全漏洞扫描是评估和分析信息系统安全性的基础和安全扫描系统的必要组成部分.
短句来源
     The Research and Design of Network Vulnerability Scanning System
     网络漏洞扫描系统的研究与设计
短句来源
     In the end, this article describes the design and implementation of a network vulnerability scanning system, which names NVS (Network Vulnerability Scanner).
     最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(Network Vulnerability Scanner)。
短句来源
     Security vulnerability scanning tools can find a large number of vulnerabilities in computer system,but the division of the severity of vulnerabilties has no relation with the application environment.
     在利用安全漏洞扫描工具对计算机系统进行扫描时,能够发现大量的安全漏洞,但是目前对漏洞严重性的划分没有和应用环境相结合,划分的也不够细致。
短句来源
     Design and Implementation of Agent-based Network Vulnerability Scanning System
     基于Agent的网络漏洞扫描系统的设计与实现
短句来源
更多       
  vulnerability scan
     Design of a system for vulnerability scan and detection
     一个漏洞扫描与检测系统设计
短句来源
     Arm at the LAN vulnerability in the periods of transition from IPv4 to IPv6, we rebuild the detect engine and plugms database of NESSUS to improve the IPv6 vulnerability scan ability.
     针对局域网内双栈主机的过渡策略,对漏洞扫描系统的检测引擎和插件库进行改进,使之具备IPv6漏洞扫描的能力。
短句来源
     The Design of an Integrative Scan System Based on Vulnerability Scan
     基于漏洞扫描的综合扫描系统设计
短句来源
     The risk management contains lots of security technology including vulnerability scan, threat recognition, risk assessment and response technology.
     风险管理集中了多种安全技术:漏洞扫描、威胁识别、风险评估以及安全响应技术。
短句来源
     In this paper, the application of vulnerability scan based on mobile agent technology is exploited.
     本文在讨论基于集散控制模型的漏洞扫描体系结构基础上,探讨移动智能体技术在漏洞扫描体系结构中的运用。
更多       
  vulnerabilities scan
     Design and Implementation of Web-based Network Vulnerabilities Scan System
     基于Web的漏洞扫描系统的设计与实现
短句来源
     This paper analyzes the importance of network vulnerabilities scanner in the field of network security and its principles of implementation. The strong points of free network vulnerabilities scanner Nessus outgoing other products are presented. Also,the design and implementation of Web-based network vulnerabilities scan system based-on Nessus are given.
     分析了网络漏洞扫描器在网络安全领域的重要作用及其工作原理,介绍了漏洞扫描器开源软件Nessus的优点,介绍了一个在Nessus的基础上开发的基于Web的网络漏洞扫描系统的设计与实现。
短句来源
     The paper mostly discusses the development of vulnerabilities databases in home and overseas. It designs a vulnerabilities database as a result of research of vulnerabilities category theory and need of vulnerabilities scan system. And a vulnerabilities detection technology based on rough set theory is advanced.
     论文主要探讨了国内外漏洞数据库的发展状况,通过对漏洞特征分类理论的研究,同时结合所开发的漏洞扫描系统的需要,设计了一个漏洞数据库,并且提出了一种基于粗糙集理论的漏洞检测技术。
短句来源
  hole scanning
     Using hole scanning technology we can detect the latent security hole in the network system and make the network administrators know the places of the security holes in advance, then guarantee the security of system.
     通过使用漏洞扫描技术可以检测网络系统潜在的安全漏洞,使网络管理员可以预先了解网络的脆弱性所在,从而确保系统的安全。
短句来源
     The network security includes firewall, intrusion detection and hole scanning etc.
     网络安全技术有:防火墙、入侵检测和漏洞扫描等。
短句来源
     Hole scanning is divided into directly test, concluding and authentication test.
     网络漏洞扫描方法分为:直接测试、推断、认证测试。
短句来源
     Network security is a dynamic system engineering, and the single security products is not enough for the building of network security, the three-dimensional security system including anti-virus, firewall, network intrusion detection system, hole scanning and other security products has been recognized by industries and users.
     网络安全是一项动态的系统工程,单一的安全产品很难满足网络安全建设的实际需要,组建由防病毒、防火墙、网络入侵检测、漏洞扫描等多种安全产品协同作战的立体安全体系已成为业界和用户的共识。
短句来源
     3. Build an experimental platform, which running the Nessus, a black hole scanning software, on a Unix server.
     (2)、阅读大量的中、外文资料,分析了Nessus这个典型的客户/服务器端漏洞扫描工具的软件结构,加载插件的过程以及NASL脚本语言的编写方法
短句来源
更多       

 

查询“漏洞扫描”译词为其他词的双语例句

 

查询“漏洞扫描”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  vulnerability scanning
An Outsourced Solution might not be suitable for real-time or high performance environments if the agreement includes random vulnerability scanning.
      
DOT continues to conduct weekly vulnerability scanning of all public facing and e-Government Web servers.
      
Existing vulnerability scanning tools do not clearly identify which vulnerabilities are tested and which are not.
      
Expanded the vulnerability scanning to internal servers as well as part of a quarterly compliance review process.
      
SAINT Corporation is the first developer of integrated vulnerability scanning and automated penetration testing software.
      
更多          
  vulnerability scan
It may be necessary to put a variety of these technologies in place to perform different levels of vulnerability scan.
      
The last step of the vulnerability scan is to present a report to the user.
      
  hole scanning
The results measured by using the fluorescent screen and pin-hole scanning technique are given.
      
  其他


点击这里查询相关文摘
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞扫描的内容
在知识搜索中查有关漏洞扫描的内容
在数字搜索中查有关漏洞扫描的内容
在概念知识元中查有关漏洞扫描的内容
在学术趋势中查有关漏洞扫描的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社