助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞扫描 在 互联网技术 分类中 的翻译结果: 查询用时:0.829秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
安全科学与灾害防治
更多类别查询

图标索引 历史查询
 

漏洞扫描     
相关语句
没有找到相关双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  vulnerability scanning
An Outsourced Solution might not be suitable for real-time or high performance environments if the agreement includes random vulnerability scanning.
      
DOT continues to conduct weekly vulnerability scanning of all public facing and e-Government Web servers.
      
Existing vulnerability scanning tools do not clearly identify which vulnerabilities are tested and which are not.
      
Expanded the vulnerability scanning to internal servers as well as part of a quarterly compliance review process.
      
SAINT Corporation is the first developer of integrated vulnerability scanning and automated penetration testing software.
      
更多          
  vulnerability scan
It may be necessary to put a variety of these technologies in place to perform different levels of vulnerability scan.
      
The last step of the vulnerability scan is to present a report to the user.
      
  hole scanning
The results measured by using the fluorescent screen and pin-hole scanning technique are given.
      
  其他


This paper discusses internet information security technology such as data encryption ,visit control ,firewall ,loopholes scanning, security verification of network agreement, illegal intrusion logging, network antivirus, complete control of data and so on. it provide reference for internet information security

对Internet信息安全技术 ,如数据加密、访问控制、防火墙、漏洞扫描、网络协议安全性验证、入侵检测、网络反病毒、数据完整性控制等作了较全面和较深入的探讨 ,为Internet信息安全性建设提供参考和帮助

In this paper, the author researched the key technology of network information security of contemporary manufacturing enterprise, include firewall, data encrypt, leak scan, inbreak detect ion etc.and gave an example which apply these technologies to assure the network information security of contemporary manufacturing enterpr ise.

研究现代制造企业保障企业网络信息安全的关键技术 ,包括防火墙技术、加密型网络安全技术、漏洞扫描技术和入侵检测技术等 ,并在此基础上给出了应用这些技术来保障现代制造企业信息安全的应用实例

Security is important for computer science and to find holes is the first thing to do. Because of some reasons, the network manager can seldom apply a full security test of his system in time. Therefore a security hole scanner will be very useful to them. The analysis of the principle of the hole scanner is firstly put forward in this paper and the design and implementation of a Net-Host combined hole scanner are introduced.

计算机安全问题是在信息化过程中急需解决的问题 ,而安全漏洞的发现对保护系统安全有着非常重要的意义。网络管理人员由于种种原因 ,很难及时、全面地测试系统的安全性。因此 ,设计一种能代替他们进行测试的工具就显得十分必要。本文首先对漏洞扫描的原理进行了分析 ,主要介绍了一种主机与网络相结合的安全漏洞扫描的设计及实现。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞扫描的内容
在知识搜索中查有关漏洞扫描的内容
在数字搜索中查有关漏洞扫描的内容
在概念知识元中查有关漏洞扫描的内容
在学术趋势中查有关漏洞扫描的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社