This provides the Corporation with a full range of vantage points to observe attacks, including: reconnaissance, intrusion, compromise, command and control, and lateral movement.
这为公司提供了广泛的视点观察各种攻击,其中包括侦察、入侵、破解、指挥控制和横向运动等。
Intrusion detection - Alarm control and indicating equipment - Requirements.
侵入检测。报警控制和指示设备。要求。
Fittings and other components to seal the well to prevent air intrusion, so as to control air traps and the occurrence of cavitation.
管接头等元件的密封要良好,以防止空气侵入,从而控制气穴与气蚀的发生。
This is precisely what Vista's somewhat-maligned User Account Control attempts to replicate, limiting points of intrusion and requiring explicit user permission to get anywhere deep.
这正是Vista的有些糟糕的用户帐户管理试图学习的地方,限制切入点,要求准确的用户允许才可以进一步操作等。
Internal auditors play a significant role in developing and maintaining an adequate internal control structure that incorporates prevention against system intrusion.
为有效防范系统入侵,内部审计人员应参与内部控制系统的创建与完善过程。
Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.
网络入侵诱控是一种可以检测分析并对入侵行为做出主动控制的安全新技术。
Free switch and control of network matrix and images, linkage intrusion alarm system.
实现网络矩阵与图像的自由切换和控制,联动入侵报警系统。
It is mostly used in the function optimization, engineering control and intrusion detection.
人工免疫系统现在更多的是被用于函数优化、工程控制及入侵检测方面。
Components, such as pipe joint sealed well, in order to prevent the air intrusion, thus control air-pocket and the occurrence of cavitation.
管接头等元件的密封要良好,以防止空气侵入,从而控制气穴与气蚀的发生。
With the addition of standard software components, the new controller eliminates the need for separate, dedicated access control, CCTV, intrusion, and intercom systems.
除了标准的软件组件,新的控制器无需加入单独的出入口控制系统、闭路电视、入侵、和对讲系统等。
As a highly dangerous and covert remote control tool, trojan horse is commonly used techniques on network intrusion.
木马作为一种危害性大、隐蔽性高的远程控制工具,是目前比较常用的网络入侵技术。
In the late 1990s, the exploitation of groundwater began to under control, seawater intrusion slow down, but the area of seawater intrusion is still increasing in the study area.
上世纪九十年代中后期,虽然对地下水开采有所控制,海水入侵有所减缓,但研究区海水入侵的面积还在增加。
The seven solutions address intrusion detection, crowd control, loitering, standing vehicles, forbidden direction or path of motion, camera triggering, and facility utilization.
七款软件方案适用于入侵警报,人群控制,运动和静止车辆,禁止行驶方向和道路,摄像机触发和设备利用。
With the traditional security mechanisms compared, Intrusion detection is treatment after program, with intelligent control, real-time detection, dynamic response, easy configuration, etc.
与传统的预防性安全机制相比,入侵检测是一种事后处理方案,具有智能监控、实时探测、动态响应、易于配置等特点。
With the traditional security mechanisms compared, Intrusion detection is treatment after program, with intelligent control, real-time detection, dynamic response, easy configuration, etc.
与传统的预防性安全机制相比,入侵检测是一种事后处理方案,具有智能监控、实时探测、动态响应、易于配置等特点。
应用推荐