您要查找的是不是:
- Design and Implementation of Agent-based Network Vulnerability Scanning System 基于Agent的网络漏洞扫描系统的设计与实现
- Design of a Network Vulnerability Scanning System and Its Application 网络隐患扫描系统的设计与应用
- The management and API of the system are also discussed, and finally its actual application is presented in the realized distributed vulnerability scanner system and security evaluation system. 此外,对其管理维护和应用访问接口进行了讨论,最后给出了该库在已实现的分散式脆弱性扫描系统和安全评估系统中的具体应用。
- Regular IS report, include IS walkthrough report, vulnerability scan report. 日常信息安全报告,包括信息安全检查报告,安全漏洞报告等。
- Will a vulnerability scan damage my site, or pose a threat to my data? 将一个漏洞扫描损害我的网站,或威胁到我的数据?
- Design and Implementation of Network Vulnerabilities Scanner System 网络隐患扫描系统设计与实现
- The machine scanning system connects to PC machines by print the port LPT. 机械扫描系统通过打印端口LPT与PC机相连。
- This is particular useful with a good tuned vulnerability scanner and IDS. 使用漏洞扫描器与相应的IDS对应起来如果处理的好的话这种关联非常有用。
- The scanning system turns letters on the page to digital signals that are fed to the computer. 扫描系统把这一页的字母转换成数字符号输入计算机。
- A precision mechanical scanning system of BCT-3 high resolution industrial X-CT is introduced. 本文介绍了BCT-3型高分辨工业X-CT的机械扫描系统设计。
- A four-axis scanning system composed of a CMM, a structured-light sensor and a rotation table were presented. 提出了一种由三坐标测量机、线结构光测头和回转工作台构成的四轴扫描测量系统。
- The speed matching between big-inertia minor and fast-steering minor is very important in staring and scanning system. 摘要在凝视扫描系统中,大惯量反射镜与快速控制反射镜的速度匹配非常重要。
- Network Based Vulnerability Scanning Technique 基于网络的安全漏洞探测技术
- Because dark colors absorb light, it is often difficult for a laser scanning system to see the laser trace or beam used to capture the shape. 大家都知道,黑色吸光,使得扫描仪难于捕获激光束而得到被测物的形状。
- The basic theory,structure,characteristics and implement method of the hardware and software system of 3 D Color Scanning System(3DLCS)are introduced. 论述了 3DLCS的硬件系统和软件系统的基本构成、基本特点和实现方法。
- The CRT based television was based on an interlaced scan system from the beginning of TV. 以影像管为基础的电视以来自电视的开始的一个被使交织的扫描制度为基础。
- This article presents the technology principle and realization of port scanner and vulnerability scanner in the domain of network security scanning and introduces the main scanister products. 阐述网络安全领域的两大扫描技术端口扫描和漏洞扫描的技术原理及其实现,并介绍扫描器的代表性产品。
- The key technologies of practicality of confocal laser scanning system are point light source, point detecting and scanning. 激光共焦系统实用化的关键技术在于:点光源、点探测器以及扫描技术。
- The speed matching between big-inertia mirror and fast-steering mirror is very important in staring and scanning system. 在凝视扫描系统中,大惯量反射镜与快速控制反射镜的速度匹配非常重要。
- The laser scanning system development orientation approbatory possesses two: one is light engine scanning the other is fame scanning. 激光扫描系统的工作方式主要有两种:一是光机扫描,二是声光扫描。
