Intrusion detection systems

Results: 104



#Item
71Security Information Management b-i branding. technology. integration. www.b-i.com

Security Information Management b-i branding. technology. integration. www.b-i.com

Add to Reading List

Source URL: www.b-i.com

Language: English - Date: 2014-06-17 04:23:05
72Managed Intrusion Detection Real Time Network Visibility

Managed Intrusion Detection Real Time Network Visibility

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2014-02-19 04:12:34
73AIDE_3rd_Newsletter_v4.pub

AIDE_3rd_Newsletter_v4.pub

Add to Reading List

Source URL: www.aide-eu.org

Language: English - Date: 2006-04-27 08:12:26
74IDS Evasion Techniques and Tactics

IDS Evasion Techniques and Tactics

Add to Reading List

Source URL: bandwidthco.com

Language: English - Date: 2012-02-12 19:18:28
75C H A P T E R  12 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection

C H A P T E R 12 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection

Add to Reading List

Source URL: www.cisco.com

Language: English
76Preparing for Intrusion Detection Presentation Abstract Systems and networks are subject to attacks both internally and externally. The increasingly frequent attacks on Internet-visible systems could be attempts to steal

Preparing for Intrusion Detection Presentation Abstract Systems and networks are subject to attacks both internally and externally. The increasingly frequent attacks on Internet-visible systems could be attempts to steal

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2000-11-03 00:00:00
    77Detecting Hidden Logic Bombs in Critical Infrastructure Software

    Detecting Hidden Logic Bombs in Critical Infrastructure Software

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2012-03-26 14:41:48
    78FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [removed] Rayford B. Vaughn

    FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [removed] Rayford B. Vaughn

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2000-11-03 00:00:00
    79A Query Facility for Common Intrusion Detection Framework Peng Ning, X. Sean Wang, Sushil Jajodia Center for Secure Information Systems George Mason University, Fairfax, VA 22030, USA Voice: ([removed]f1629, 1662, 1653g,

    A Query Facility for Common Intrusion Detection Framework Peng Ning, X. Sean Wang, Sushil Jajodia Center for Secure Information Systems George Mason University, Fairfax, VA 22030, USA Voice: ([removed]f1629, 1662, 1653g,

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2000-11-03 00:00:00
    80NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

    NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

    Add to Reading List

    Source URL: www.voiceproducts.com

    Language: English - Date: 2012-02-16 13:09:02