文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。
Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.
她的同事崔尼蒂(Trinity)曾经入侵过BBC和苏格兰场的计算机网络:“他甚至曾经短暂控制过在北海巡逻的核潜艇。”
Her colleague Trinity has infiltrated the computers of the BBC and Scotland Yard: “He even managed—for a short time—to take command of a nuclear submarine on patrol in the North Sea.”
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
应用推荐