在 英语 中使用 Security vulnerabilities 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
It also requires DHS to produce annual reports on communications technology that presents security vulnerabilities, with the first report coming within 80 days.
When managing hundreds of services and new security vulnerabilities, these concepts need to be systemic to your cloud computing architecture.
Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues.
A utility program for managing SanDisk solid-state drives(SSDs) has two security vulnerabilities in it that heighten data loss risks for organizations using the application.
I can see the value in having a disclosure deadline that brings pressure on organizations to take fixing security vulnerabilities quickly.
Top transition concerns include security vulnerabilities(60 percent), maintaining transition technologies(53 percent), and deploying transition technologies(50 percent).
The project' s true aim was to reduce critical location-specific security vulnerabilities.
As you know, all software of any substance has bugs, and some of those bugs may result in potential security vulnerabilities.
While LastPass is our favorite for its features and interface, it has experienced security vulnerabilities in the past.
By having an automated cloud-like experience in their own private data center, they can provide uniform policy and control and mitigate security vulnerabilities.”.
With these rapidly accelerating changes comes a corresponding increase in security vulnerabilities and risks to sensitive data as it is being transported or stored.
You can check the code to locate bugs, explore security vulnerabilities, or simply study what that code is doing on your machine(s).
WFP also works to use spatial information to identify key livelihood and food security vulnerabilities.
The most common network security concerns are webpage counterfeiting and security vulnerabilities, it added.
While LastPass is our favorite for its features and interface, we should remind you that it has experienced security vulnerabilities in the past.
However, one State' s machine-readable travel documents contain security vulnerabilities that should be addressed.
If organizations are not addressing these security vulnerabilities, they are taking a huge gamble and abusing customer trust.".
Two significant security vulnerabilities existed in Windows 2000 EFS, and have been variously targeted since.
This exception for a singular NUL character has caused innumerable errors: API weirdness, security vulnerabilities, and buffer overflows.