1) vulnerability forgery
安全漏洞伪造
2) security vulnerabilities
安全漏洞
1.
Analysis of Security Vulnerabilities State and Severity in an Enterprise Network;
一个企业网的安全漏洞状况与漏洞严重性分析
2.
Web site design and Prevention of common security vulnerabilities
网站设计常见安全漏洞及其防范探讨
3.
This paper brings forward a new solution of vulnerabilities detection,based on concluding the features of the network security vulnerabilities.
在归纳网络安全漏洞特点的基础上,提出了基于关系数据库策略驱动的漏洞探测方法,提高了网络安全评估系统的效率,增强了漏洞探测准确性,并使系统的整体分析能力大大提高,论文从原理、实现上对该方法进行了阐述,并分析了其性能。
3) security leak
安全漏洞
1.
There analyses the existing security leaks when VBScript is using clients ability to compute,and puts forward some corresponding policies.
文章分析了VBScript在利用客户机计算功能时存在的安全漏洞,并提出了相应解决对策。
2.
This paper puts forward some preventive measures according to the main security leaks of the operating system Unix/Linux,Windows NT/2000 that are commonly used.
文章就常用的操作系统Unix/Linux,WindowsNT/2000的主要安全漏洞提出了预防措施。
3.
This paper analyses the existing security leaks when VBScript is using clients ability to compute,and puts forward some corresponding policies.
本文分析了VB Script在利用客户机计算功能时存在的安全漏洞,并提出了相应解决对策。
4) security holes
安全漏洞
1.
The analysis of security holes in interface of web servers and its detection;
Web服务CGI安全漏洞分析与检测
2.
It was made discussion on the Railway Internet BookingsForwarded System based on the complexity of railway system , advanced the method that was based upon the SET protocolaccording to the security holes of Internet bookings forwarded.
阐述了铁路电子商务的特点,根据铁路系统复杂性,就铁路网上订票系统进行探讨,对网上订票过程中出现的安全漏洞提出基于SET协议的解决方法。
3.
This paper discusses the security holes of mobile ad hoc network and deficiencies of corresponding protective measures, which are compared with the security protective measures of the existing networks.
文中探讨了移动adhoc网络特有的各种安全漏洞以及相应的对策中存在的各种不足,并与现有网络中的安全对策进行了较深入的比较,从而总结出该领域研究的发展趋势,并指出了几个值得重视的研究方向。
5) vulnerability
[英][,vʌlnərə'biliti] [美][,vʌlnərə'bɪlətɪ]
安全漏洞
1.
Research on Computer System Security Vulnerability and Fix Technology;
安全漏洞及其修补技术的研究
2.
Vulnerability Discovery Model Based on Market Share for Operating Systems
基于市场占有率的操作系统安全漏洞检测模型
3.
Vulnerability detection and protection of computer network
计算机网络安全漏洞检测及防护
6) security vulnerability
安全漏洞
1.
Software security vulnerability detection approach based on static analysis;
基于静态检测的程序安全漏洞测试
2.
The Security Vulnerability of Chinese Accounting Software;
四个财务软件的安全漏洞及补救措施
3.
Research and Implementation of Security Vulnerability Issue Based on LDAP;
基于LDAP的安全漏洞发布研究与实现
补充资料:伪造、出售伪造的增值税专用发票罪
伪造、出售伪造的增值税专用发票罪:指仿照国家增值税专用发票的式样,使用各种方法非法制造假增值税专用发票冒充真增值税发票或者出售伪造的假增值税专用发票的行为。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条