搜索结果
找到约 9 项符合
intrusion 的查询结果
电子书籍 The Tao of Network Security Monitoring Beyond Intrusion Detection
The Tao of Network Security Monitoring Beyond Intrusion Detection
其他 Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents
系统设计方案 The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theo
The Algorithm of Detectors Generating in Intrusion Detection System
Based on Artificial Immune Theory
电子书籍 about intrusion detection system of mobile agent
about intrusion detection system of mobile agent
电子书籍 『下载说明』这里提供给大家的是早已金盆洗手的著名黑客KEVIN D. MITNICK将其一生积累下来的丰富技能汇集成书的《The Art of Intrusion》(入侵的艺术)英文版的PDF格式电子
『下载说明』这里提供给大家的是早已金盆洗手的著名黑客KEVIN D. MITNICK将其一生积累下来的丰富技能汇集成书的《The Art of Intrusion》(入侵的艺术)英文版的PDF格式电子书下载。
其他书籍 using genetic algorithm in network intrusion detection systems
using genetic algorithm in network intrusion detection systems
网络 The Network Security Response Framework (NSRF) allows for testing different computer security respon
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
Linux/Unix编程 在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
书籍 Active+and+Programmable+Networks
New applications such as video conferencing, video on demand, multi-
media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed
collaboration, and intranet security require advanced functionality from
networks beyond simple forwarding congestion control techniques.