• Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.

    分析归纳网络漏洞扫描系统功能基础上,构建了其对应的CIM通用模型

    youdao

  • A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    漏洞扫描器类似其他类型扫描器——例如端口扫描器有助于保障端口上网络系统的安全

    youdao

  • A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    漏洞扫描器类似其他类型扫描器——例如端口扫描器有助于保障端口上网络系统的安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定