It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可变通常是安全或者入侵检测工作的一部分。
This security feature provides robust protection against unwanted intrusion and provides designated users easy access to documents that they should see.
该安全特性为防止有害入侵提供了强力保护,并且能够使指定用户方便地访问其应该查看的文档。
A no-fly zone has been established in the airspace over the courtroom to prevent media intrusion and escape attempts, and even the locks of the court have been changed to avoid security lapses.
在法院的上空已经设置了禁飞区,防止媒体的干扰还有犯人逃跑,而且还把法院锁上避免安全问题上的疏忽。
Intrusion detection and audits of security logs.
入侵检测以及安全日志审核。
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
It's true that both intrusion detection and Snort usage extends well beyond Web sites and into larger network security issues.
确实,入侵检测和Snort的使用都超越了Web站点本身,延伸为更广泛的网络安全问题。
Recently the computer-security company RSA (a division of EMC) was penetrated by an intrusion which appears to have stolen the secret sauce behind the company's SecureID.
近期,计算机安全公司RSA(美国EMC分公司)的网络遭到非法侵入,侵入者目的像是要窃取公司安全ID后的秘密系统。
Intrusion detection technique, which as a kind of solution of protecting network security, has been paid more and more attention by people.
入侵检测技术作为保护网络安全的一种解决方案,越来越受到人们的重视。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
Targets have included Citigroup, Lockheed Martin and even RSA Security, which makes password tokens that big companies use to protect themselves from intrusion.
攻击的目标包括花旗集团、洛克希德·马丁(Lockheed Martin),甚至连给大公司制作令牌密码来防御入侵的RSA公司无法避免。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
Intrusion-tolerance is a new information security technology and research approach.
容忍入侵是一种全新的信息安全技术与研究方法。
With the rapid development of network technology, Intrusion detection has become a highlighted topic of network security.
随着网络技术的飞速发展,入侵检测技术已成为网络安全关注的热点。
Intrusion detection is an important component of network security architectures.
入侵检测是网络安全体系的重要组成部分。
Intrusion Detection is an important means to achieve database security.
入侵检测是保障数据库安全的重要手段。
In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.
计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。
At last, main intrusion methods and security compromization targeted at information systems are discussed.
最后,论述了在网络环境中主要采用入侵手段以及信息系统面临的主要安全威胁。
Intrusion detection is an important method to protect system security.
入侵检测是保护系统安全的重要途径。
Intrusion Detection System is the next generation of dynamic security technology.
入侵检测系统是新一代的动态安全防范技术。
Due to its essential role in network security, research on intrusion detection techniques is of great importance.
鉴于入侵检测技术对网络安全所起的重要作用,对入侵检测技术进行研究具有重要的意义。
It can help you ward off network intrusion and attacks, prevent information leakage, protect user machines network security.
它可以帮你抵挡网络入侵和攻击,防止信息泄露,保障用户机器的网络安全。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
The network security is threatened mainly to pass the intrusion of the information system of network.
网络安全的一个主要威胁就是通过网络对信息系统的入侵。
It also can stop intrusion activities with the linkage of other security technology.
通过与其它的安全产品的联动还可以实现对入侵行为的有效阻止。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
应用推荐