您要查找的是不是:
- You can use this information to fix a security breach. 您可以使用這些信息來(lái)修復違反安全性的情況。
- Setting certain environment variables may be a potential security breach. 設置某些環(huán)境變量可能是潛在的安全缺口。
- If there is a security breach in a small area, it can permeate the entire system. 如果在小范圍內有一安全漏洞,它將擴散到整個(gè)系統。
- If there is a security breach in a small area,it can permeate the entire system. 如果在小范圍內有一安全漏洞,它將擴散到整個(gè)系統。
- A dutch biotech firm reported that they may have had a security breach involving anthrax last week. 荷蘭的生物公司報告稱(chēng) 上個(gè)星期公司的炭疽可能被盜
- How did a terror cell get its hands on anthrax without a single lab reporting a security breach? 怎么會(huì )在一個(gè)恐怖組織有炭疽病毒的情況下 連一個(gè)安全警報都沒(méi)有?
- The SSL Protocol is a important protocol to keep the net security,and it is widely applicable in communication security. SSL協(xié)議是網(wǎng)絡(luò )安全的重要協(xié)議;被廣泛應用于安全數據傳輸與互聯(lián)網(wǎng)交易中.
- Determine the potential for damage from a successful attack that results in a security breach. 確定攻擊成功而導致安全性被破壞的可能性。
- NET Security model fills volumes, but you can take a small set of reasonable actions to enable your assemblies to interact with the . NET安全模型實(shí)現得要幾卷書(shū),但是你可以采取一小部分合理的動(dòng)作,使你的程序集更容易的和.
- This exposes the data to security breaches. 這就使數據暴露于安全的薄弱環(huán)節。
- XSS is a security breach that takes advantage of dynamically generated Web pages. XSS是一種破壞安全的方法,它利用了動(dòng)態(tài)生成的網(wǎng)頁(yè)。
- Use this tool to take a report server instance offline to investigate a security breach or if you think the report server is being attacked. 若要調查安全違規問(wèn)題或者您認為報表服務(wù)器受到攻擊,可以使用此工具將報表服務(wù)器實(shí)例脫機。
- So hot in fact the rumors swirled the Acura and Honda threatened to pull out of the show in protest for the security breach! 這么熱,事實(shí)上,巴拉德周?chē)闹幐韬捅咎锏耐{要退出該節目以示抗議的安全漏洞!
- Base on Simple Network Management Protocol (SNMP) design an Antivirus module of net security management platform. The Antivirus module use the SNMP alarm and remote management of Antivirus software. 利用網(wǎng)絡(luò )防病毒軟件的SNMP報警機制及其遠程管理功能,設計一種基于SNMP簡(jiǎn)單網(wǎng)絡(luò )管理協(xié)議的網(wǎng)絡(luò )安全管理平臺反病毒模塊。
- The committee says incidents such as the security breach on the MTAS website, and the loss of 25m child benefit records last year, must be taken more seriously. 該委員會(huì )表示,例如MTAS網(wǎng)站安全侵害與去年2500萬(wàn)兒童利益記錄丟失的事件必須得到更加嚴肅的對待。
- Distributed Denial of Service Attack (DDoS) is one of the dangers intrusion, the intrusion hide themselves through all kinds of ways, Trace back is one of major hotspot of net security science. 摘要分布式拒絕服務(wù)攻擊通過(guò)控制多臺傀儡機對目標機進(jìn)行攻擊,該類(lèi)型攻擊的攻擊路徑隱蔽,對攻擊者跟蹤困難。
- We consider this security breach to be a horrendous and inexcusable offense," Norton's statement emphasises, without identifying the consultant concerned or his/her company. 我們認為這是違反保安是一個(gè)可怕的和不可饒恕的罪行,在"諾頓的聲明強調了,沒(méi)有查明有關(guān)顧問(wèn)或他/她的公司。
- Distributed Denial of Service Attack(DDoS) is one of the dangers intrusion,the intrusion hide themselves through all kinds of ways,Trace back is one of major hotspot of net security science. 分布式拒絕服務(wù)攻擊通過(guò)控制多臺傀儡機對目標機進(jìn)行攻擊,該類(lèi)型攻擊的攻擊路徑隱蔽,對攻擊者跟蹤困難。
- These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers. 這些帳戶(hù)還沒(méi)有被訪(fǎng)問(wèn)的谷歌通過(guò)任何安全漏洞,但大多數通過(guò)網(wǎng)路釣魚(yú)詐騙或惡意軟件在用戶(hù)的電腦上的可能。
- System monitoring that alerts the enterprise to security breaches. 安全入侵的系統監視。