助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞扫描工具 的翻译结果: 查询用时:0.224秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

漏洞扫描工具
相关语句
  hole scanner
     Design and Implementation of a Net-Host Combined Hole Scanner
     一种主机与网络相结合的漏洞扫描工具的设计与实现
短句来源
  “漏洞扫描工具”译为未确定词的双语例句
     Security vulnerability scanning tools can find a large number of vulnerabilities in computer system,but the division of the severity of vulnerabilties has no relation with the application environment.
     在利用安全漏洞扫描工具对计算机系统进行扫描时,能够发现大量的安全漏洞,但是目前对漏洞严重性的划分没有和应用环境相结合,划分的也不够细致。
短句来源
     Secondly,the unconsistent of holes storeroom standard makes the unconsistent of the scanned results that makes users unconvenience.
     第二,目前漏洞扫描安全漏洞库的标准不一致,造成两种漏洞扫描工具测出来的安全漏洞不一致,给用户带来不方便;
短句来源
     And the function of gathering vulnerability information is often provided by network vulnerability scanning tools.
     而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
短句来源
     The function of gathering vulnerability information is often provided by network vulnerability scanning tools.
     而网络漏洞扫描工具则提供了收集目标系统漏洞信息的功能,这使得漏洞扫描工具在给网络管理员提供便利的同时也给入侵者提供了方便,本文着重考虑的是为网络管理员提供最大的方便。
短句来源
     Through studying the security vulnerability scanning principle and the existing network vulnerability scanner and learning from some actual scanning experiences, a security vulnerability scanner is designed and realized. It is based on port scanning for the network security administrators.
     经过对安全漏洞扫描器原理的深入分析,以及对现有网络漏洞扫描工具的研究和一些实际的扫描经验,设计和实现了以网络安全管理人员为服务对象的基于端口扫描的安全漏洞检测系统。
短句来源
更多       
  相似匹配句对
     Tools
     工具
短句来源
     The Study of the Technique for Network Vulnerability Scanning
     网络漏洞扫描技术
短句来源
     Design of Distributed Vulnerability Scanning System
     分布式漏洞扫描系统的设计
短句来源
     Design and Implementation of a Net-Host Combined Hole Scanner
     一种主机与网络相结合的漏洞扫描工具的设计与实现
短句来源
     And the function of gathering vulnerability information is often provided by network vulnerability scanning tools.
     而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
短句来源
查询“漏洞扫描工具”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  hole scanner
Finally, we present comparisons of the photoinductive imaging results with usual eddy current images obtained from a 0.75-mm triangular EDM notch using a rotating bolt-hole scanner.
      


The security strategy of information system for electronic purchase includes using operating system that can set entry purview, database accessing applied intelligent card or password card for dynamic attestation, setting special fire wall in important Internet, setting real time testing tool for network inbreak and scan tool in important Intranet, establishing multilevel virus protect system, using technology of inveigling intruder, user identity identified with intelligent card and biology character or digital...

The security strategy of information system for electronic purchase includes using operating system that can set entry purview, database accessing applied intelligent card or password card for dynamic attestation, setting special fire wall in important Internet, setting real time testing tool for network inbreak and scan tool in important Intranet, establishing multilevel virus protect system, using technology of inveigling intruder, user identity identified with intelligent card and biology character or digital signature, network payment using credit card and electron cheque, applying secret keys encrypting technology, set up security center of attestation and payment gateway, and the system for security manage of network.

电子采购中的信息系统安全策略包括:使用可设置登录权限的操作系统;数据库访问采用智能卡或动态认证口令卡;重要外网安装专用防火墙;重要内网安装网络入侵实时检测和漏洞扫描工具;建立多级病毒保护体系;采用黑客诱骗技术;利用用户智能卡、生物学特征或数字签名进行身份认证;网上支付使用信用卡、电子支票等;采用密钥加密技术;建立安全认证中心和支付网关;建立网络安全管理体制。

Now there are many discoveries of new security flaw,patching has been a heavy task.How to pitch effectively is a problem which network manager care a bout very much.The article tells the importance of patch management and introduces the way how to choose and use patch management tools and scanning tools for security flaws in Windows operation system.

现在每周都能发现许多新漏洞,打补丁已经成了一项繁重的任务。如何高效率地打补丁已成为网络管理人员非常关心的问题。本文叙述了补丁管理的重要性,介绍了Windows操作系统下多种补丁管理工具及多种安全漏洞扫描工具的选择、使用。

The concept of vulnerability-scanner and the basic mechanism of operations is introduced,sums up and analyses several kinds of key technologies in detail are summed up and analysed,such as whole TCP scans,TCP SYN scans,ICMP scans,TCP FIN scans,etc.Then several common vulnerability-scanner is introduced.Finaliy,the application of the vulnerability-scanning in the intrusion de-tection system and the future development of intrusion detection system is introduced.

介绍了漏洞扫描器和其基本工作原理后,归纳并且详细分析了网络安全扫描软件所涉及到的几种关键技术。其中包括全TCP连接扫描、TCPSYN扫描、ICMP扫描和TCPFIN扫描等。然后介绍了几种常见的漏洞扫描工具,最后介绍了漏洞扫描技术在入侵检测系统中的具体应用和入侵检测系统的未来发展。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞扫描工具的内容
在知识搜索中查有关漏洞扫描工具的内容
在数字搜索中查有关漏洞扫描工具的内容
在概念知识元中查有关漏洞扫描工具的内容
在学术趋势中查有关漏洞扫描工具的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社