政策漏洞,policy vulnerabilities
1)policy vulnerabilities政策漏洞
2)Vulnerability Countermeasure漏洞对策
3)leak[英][li:k][美][lik]漏洞
1.The security of system was influenced by ASP s leak;ASP的漏洞对系统安全的影响
2.Show Leak of Access & ASP Web Build and Keep Away From Attack;Access与ASP在网站建设中的漏洞与安全防范
英文短句/例句

1.Vulnerability Attack and Defense and Vulnerability Database Design;漏洞攻击防范技术与漏洞数据库设计
2.There's a leak in the roof - the rain's coming in.房顶有漏洞,雨往里进。
3.He stopped the leak in the pipe.他堵住管子上的漏洞
4.plug a leak in the barrel用塞子堵住大桶的漏洞.
5.Plug a leak in the barre用塞子堵住大桶的漏洞
6.All the little leaks were shut off.所有的小漏洞都堵死了。
7.Any stigma will do to beat a dogma.一点漏洞,足可打破教条。
8.He was consistent in what he said, and there was no loophole.他说话严密, 没有漏洞
9.play for an opening促使对方出漏洞的打法
10.A Lesson for the Road交通大执法,安全无漏洞
11.numerous lacunae in his argument他的议论有很多漏洞
12.Rain is still pouring into the house through the hole.雨水仍从漏洞灌进屋内。
13.a flaw in a contract合同中的一个漏洞.
14.Research of Vulerability Detection and Usage under Win32 Plateform;基于Win32平台的漏洞挖掘和漏洞利用技术研究
15.Vulnerability mining model for Windows based on vulnerability characteristics and Fuzz technology基于漏洞特征和Fuzz技术的Windows漏洞挖掘模型研究
16.The leak flings out about five tons of water in minute这个漏洞每分钟漏水5吨。
17.Any CGI script installed at your site may contain bugs, and every such bug is a potential security hole.所有安装在网站上的CGI脚本程序都有可能包含漏洞,每个漏洞都是一个潜在的安全漏洞
18.They stopped up120leaks with40000gunny sacks.他们用4万只沙袋堵住了120个漏洞
相关短句/例句

Vulnerability Countermeasure漏洞对策
3)leak[英][li:k][美][lik]漏洞
1.The security of system was influenced by ASP s leak;ASP的漏洞对系统安全的影响
2.Show Leak of Access & ASP Web Build and Keep Away From Attack;Access与ASP在网站建设中的漏洞与安全防范
4)loophole[英]['lu:ph??l][美]['lup'hol]漏洞
1.Safe loophole in ASP and its protection;ASP安全漏洞及其防护
2.Research and Implementation of Active Scanner Against Loophole Embedded in Web Application Program;Web应用程序漏洞主动扫描器的研究与实现
3.In this paper,the computer network security problems are analyzed from several aspects,including the operating system loophole,the loopholes in the TCP/IP protocol that can be used by hackers,the computer viruses,and the security problems related with users.网络安全具有广泛的内容,涉及网络硬件、软件、协议等很多因素,该文从操作系统漏洞、可被黑客利用的TCP/IP协议漏洞、病毒等方面分析了网络中存在的安全隐患问题,并针对网络安全问题总结了一些通用的对策。
5)vulnerability[英][,v?ln?r?'biliti][美][,v?ln?r?'b?l?t?]漏洞
1.ActiveX vulnerability exploiting technique based on Fuzzing;基于Fuzzing的ActiveX控件漏洞发掘技术
2.Design and Implementation of a Network-based Vulnerability Scanner;基于网络的漏洞扫描器设计与实现
3.Research of automatic worm signature generation based on vulnerability;基于漏洞的蠕虫特征自动提取技术研究
6)hole[英][h??l][美][hol]漏洞
1.Analysis of common hole in windows NT/2000operation system;Windows系统常见漏洞分析
2.Properties assessments of holes in anomaly detection systems异常检测系统的漏洞分析
3.In this paper,through analyzing negative selection algorithm and the reason of appearing "holes",an multi-level negative selection algorithm of generating different scales mature detectors is put forward.通过分析人工免疫系统中的主要算法——否定选择算法及检测器产生漏洞的原因,提出一种生成不同检测尺度的成熟检测器多级否定选择算法。
延伸阅读

勾漏洞风景名胜区勾漏洞风景名胜区于广西北流市东北5 公里的勾漏山下, 由宝圭洞、玉阙洞、白沙洞、桃源洞以及许多小洞连贯组成, 全长 1000多米,因洞勾、曲、穿、漏而得名。洞府清邃曲深, 绮丽奇幻,钟乳石千姿百态,自魏晋起已负盛名,洞前有唐宋 以来摹崖碑碣百多幅,有葛洪炼丹遗址。为中国道教第二十二洞天。