您要查找的是不是:
- Design and Implementation of Agent-based Network Vulnerability Scanning System 基于Agent的网络漏洞扫描系统的设计与实现
- Design of a Network Vulnerability Scanning System and Its Application 网络隐患扫描系统的设计与应用
- network vulnerability scanning 漏洞扫描
- Analysis of Network Vulnerabilities Scanning Technology 网络隐患扫描技术剖析
- Regular IS report, include IS walkthrough report, vulnerability scan report. 日常信息安全报告,包括信息安全检查报告,安全漏洞报告等。
- Will a vulnerability scan damage my site, or pose a threat to my data? 将一个漏洞扫描损害我的网站,或威胁到我的数据?
- network vulnerability scanner 网络漏洞扫描系统
- Design and Implementation of Network Vulnerabilities Scanner System 网络隐患扫描系统设计与实现
- A new network vulnerability analysis model is given by use of layered analysis in this paper. 摘要在被动网络节点脆弱性分析方法的基础上提出了一种新的基于主动攻击的网络脆弱性分析模型。
- A NT weight allotment scheme is given to quantify the network vulnerability in addition. 实验结果表明网络中不同位置节点的脆弱性对整个网络脆弱性的影响不同。
- Network Based Vulnerability Scanning Technique 基于网络的安全漏洞探测技术
- Computer network vulnerability assessment is the important part of the computer security domain, it is very important to improve oneself security level of computer network. 摘要计算机网络脆弱性评估是计算机安全领域的重要组成部分,对于提高计算机网络自身的安全水平至关重要。
- In this paper, the prevailing technices and tools of port scanners and network vulnerability scanners are analyzed and compared, and all kinds of these tools are tested. 摘要主要分析、比较和介绍了当前流行的端口扫描和网络弱点扫描技术及工具,并针对不同类型的扫描工具进行了测试比较工作。
- This article presents the technology principle and realization of port scanner and vulnerability scanner in the domain of network security scanning and introduces the main scanister products. 阐述网络安全领域的两大扫描技术端口扫描和漏洞扫描的技术原理及其实现,并介绍扫描器的代表性产品。
- This is particular useful with a good tuned vulnerability scanner and IDS. 使用漏洞扫描器与相应的IDS对应起来如果处理的好的话这种关联非常有用。
- In recent years, more and more attention is paid to the network security. Network intrusion detection and network vulnerability analysis are active solution for network security problems, and they are too much important. 网络安全问题越来越受到人们的重视,网络入侵检测和网络脆弱性分析是主动的网络安全解决方案,是解决这一问题的重要手段之一。
- This fact makes 802.11 networks vulnerable to eavesdropping. 这一种事实对偷听使 802.;11个网络易受伤害。
- Evaluation Approaches For Network Vulnerability Scanners Product 网络脆弱性扫描产品测评方法
- The management and API of the system are also discussed, and finally its actual application is presented in the realized distributed vulnerability scanner system and security evaluation system. 此外,对其管理维护和应用访问接口进行了讨论,最后给出了该库在已实现的分散式脆弱性扫描系统和安全评估系统中的具体应用。
- ISS specializes in software, appliances and services that help IT shops monitor and manage network vulnerabilities. 国际空间站的专门软件,家用电器和服务,帮助它店监测和管理网络的脆弱性。