• A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.

    公司用于检测漏洞保护s OA基础结构业务策略中包含用于目标和攻击之间多个SOA深度防御模型

    youdao

  • The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    youdao

  • As mentioned, the vulnerability of a system exists at the entry and exit points within the system. Figure 3 shows an e-Commerce system with several points that the attacker can target.

    正如前面所提系统弱点存在于系统入口出口处

    youdao

  • Then, choose target system vulnerability, all kinds of attacks by means of breakthrough, obtain found super user permissions, improve user permissions.

    然后选择作为攻击目标利用系统漏洞各种攻击手段发现突破口获取超级用户权限提升用户权限。

    youdao

  • All that is required is the target person's cellphone number, a computer and some knowledge of how cellular networks work, said the report, which aimed to spotlight a security vulnerability.

    报告所需只是跟踪目标手机号码台计算机一些关于手机网络运行知识。报告旨在曝光安全漏洞。

    youdao

  • The fragmentation artillery warhead is utilized in the paper. The target damage tree is used to build vulnerability model by means of analyzing the vulnerability of vehicle of launching missile.

    本文采用战斗部为破片式战斗部,通过导弹发射车易损性分析,目标毁伤建立目标易损性计算模型

    youdao

  • The damage experiments of simulation target′s vulnerability were made by using the real rod warhead to the charges covered steel shell.

    文中对射弹撞击引爆装药几种判据进行了分析,并利用某型破片式战斗部对带防护的装药模拟进行了易损性毁伤试验研究。

    youdao

  • The damage experiments of simulation target′s vulnerability were made by using the real rod warhead to the charges covered steel shell.

    文中对射弹撞击引爆装药几种判据进行了分析,并利用某型破片式战斗部对带防护的装药模拟进行了易损性毁伤试验研究。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定