首页 | 本学科首页   官方微博 | 高级检索  
     检索      

谈系统漏洞扫描
引用本文:李为.谈系统漏洞扫描[J].天津职业院校联合学报,2007,9(5):69-72.
作者姓名:李为
作者单位:天津市新华职工大学,天津市,300040
摘    要:对系统漏洞和系统漏洞扫描进行了探讨,主要分析了系统漏洞的分级以及常见的漏洞及其攻击方法,介绍了基于主机的漏洞扫描和基于网络的漏洞扫描的区别,并重点对网络扫描进行了研究。

关 键 词:漏洞  扫描  网络扫描
文章编号:1673-582X(2007)05-0069-04
修稿时间:2006-12-10

Research on Scanning the Hole of the Computer
LI Wei.Research on Scanning the Hole of the Computer[J].Journal of Tianjin Vocational Institutes,2007,9(5):69-72.
Authors:LI Wei
Institution:Tianjin Xinhua Staff and Workers University, Tianjin 300040 China
Abstract:This article mainly talks about the hole of the computer and how to scan the hole.It mainly analyzes the classification of the hole and how to use the hole to attack.This article also talks about the two ways of the scanning which include local scanning and network-based scanning.It also discusses the differences between them and puts the emphasis on the later one.
Keywords:hole  scan  network scanning  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号