脆弱軟體 的英文怎麼說

中文拼音 [cuìruòruǎn]
脆弱軟體 英文
fringeware
  • : 形容詞1 (容易折斷破碎) fragile; brittle 2 (較硬的食物容易弄碎弄裂) crisp 3 (聲音清脆) (of ...
  • : Ⅰ形容詞1 (氣力小; 勢力差) weak; feeble 2 (年幼) young 3 (差; 不如) inferior 4 (接在分數或...
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : 體構詞成分。
  • 脆弱 : 1. (禁不起挫折; 不堅強) fragile; frail; weak; tender; delicate 2. (意志薄弱) fragility; frailty
  • 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
  1. Abstract : based on the data obtained from field observations and deformation monitoring, this paper deals with the deformation and failure of a double - decked slope composed of soft rock strata in its lower part and hard - brittle rock strata in its upper part. it is demonstrated that the deformation of this kind of slopes is always initiated by the non - homogeneous rheological compression of the lower soft rock strata, leading to the tension fracture and toppling of the upper hard rock strata, and at last the sliding of the whole deformed body will be caused by the shear failure along the stress - concentration zone in the lower soft rock mass under the actions of the gravitational loading and infiltration water

    文摘:以現場考察和變形監測資料為依據,探討一個下部有基座,上部為硬性坡的「二元結構」邊坡的變形破壞問題,揭示這類邊坡的變形總是以下部的不均勻壓縮流變為先導,進而引起上部硬性坡的拉裂與傾倒,最終通過滲入水的作用,使下部承載狀況已進一步惡化了的,沿剪應力集中帶發生剪切破壞而導致整個變形坡的下滑。
  2. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的的類型、提供的服務、探測出其的漏洞和點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和點分佈等信息,有針性對的選取關鍵設備或者防護較的設備進行攻擊與控制。
  3. A discussion of vulnerabilities of security of instant messaging softwares in china

    國內即時通訊的安全性分析
分享友人