您要查找的是不是:
- Certificate Authority and Intrusion Detection. 北京教育考试院网络中的认证机制和入侵检测。
- Intrusion detection system is called the second strobe of security. 入侵检测系统是防火墙之后的第二道安全闸门。
- Director of Research for Intrusion Detection and Response? 关于入侵检测与响应和安全方面有什么书籍?
- Intrusion Detection is an important means to achieve database security. 入侵检测是保障数据库安全的重要手段。
- Consider security measures like Firewall and Intrusion Detection System. 要考虑采用防火墙及入侵侦测系统等保安措施。
- The most important sector in Misuse intrusion detection is pattern matching. 滥用入侵检测技术中最重要的一个环节是模式匹配,目前的模式匹配主要是对报文中特征字符串的匹配。
- Intrusion Detection(ID)is an important aspect in network security technology. 入侵检测是网络安全技术的一个重要方面。
- The origin and development of Intrusion Detection System(IDS) are reviewed. 回顾了入侵检测系统的起源及其发展过程。
- Disables the Intrusion Detection System, leaving your computer open to network attacks. 禁用入侵检测系统,将您的计算机对网络攻击开放。
- Distributed intrusion detection systems( DIDS) have many advantages such as scalability, subversion resistance. 分布式入侵检测系统有许多优点,如可测量性和抗破坏性。
- Intrusion detection belongs to the category of classification and pattern recognization in a broad sense. 入侵检测过程广义上属于分类和模式识别的范畴。
- Firewalls, Intrusion Detection Systems and Vulnerability Assessment: A Superior Conjunction? 防火墙,入侵侦测系统和弱点评估:一个超级关联?
- Ie. An intrusion detection system may need to trap every packet on the network and feed it into a system. 例如,入侵检测系统需要捕捉网络上的每个包,并把它输入到系统中。
- Intrusion Detection Technology and Its Importance in the Network of Colleges and Universities. 入侵检测技术及其在高校网络中的重要性。
- The introduction of intrusion detection includes its system model, classification, detection technologies. 分类分析技术在入侵检测中的应用。
- You will need to consider network traffic monitors, rate limiters, intrusion detection tools, and more. 您需要考虑网络流量监视器、速率限制器、入侵检测工具,等等。
- Information security of the C3I system includes communication security, information authentication, intrusion detection and virus defence. 指挥控制系统的信息安全包括保密通信、信息认证、入侵检测和病毒防范。
- Statistical abnormality examining and examining based on rule are generally accepted in intrusion detection module. 采用反常检测统计和基于规则的检测技术进行入侵检测。
- These pillars are firewalls, VPNs, antivirus software, and intrusion detection systems (IDS). 防护方法包括四个方面:防火墙、VPN、反病毒软件,以及入侵检测系统(IDS)。
- In addi tion,under certain authorization,other intrusion detection systems can be upd ated by subsc... 另外,在一定授权情况下,其他入侵检测系统可以向该系统请求分发入侵模型以得到及时更新。