Intrusion detection system

Results: 338



#Item
311IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-10-18 12:50:24
312A Mission-Impact-Based Approach to INFOSEC Alarm Correlation† Phillip A. Porras, Martin W. Fong, and Alfonso Valdes SRI International 333 Ravenswood Avenue Menlo Park, CA[removed]

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation† Phillip A. Porras, Martin W. Fong, and Alfonso Valdes SRI International 333 Ravenswood Avenue Menlo Park, CA[removed]

Add to Reading List

Source URL: www.sdl.sri.com

Language: English - Date: 2007-01-23 13:43:08
313IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-28 11:17:24
314Managed By the numbers. Security

Managed By the numbers. Security

Add to Reading List

Source URL: www.onshore.com

Language: English - Date: 2013-05-21 23:29:00
315Microsoft Word - SECURITY STATEMENT FOR INTERNET BANKING.doc

Microsoft Word - SECURITY STATEMENT FOR INTERNET BANKING.doc

Add to Reading List

Source URL: www.gulfbank.com

Language: English - Date: 2011-02-28 09:58:20
316IQ MultiAccess Access control

IQ MultiAccess Access control

Add to Reading List

Source URL: www.eel.com.tr

Language: English - Date: 2010-12-06 05:12:46
317Tools  Information Assurance Tools Report  Sixth Edition

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
318Product Overview Key Benefits Honeypot based intrusion

Product Overview Key Benefits Honeypot based intrusion

Add to Reading List

Source URL: www.keyfocus.net

Language: English - Date: 2003-06-30 08:30:29
319Journal in Computer Virology manuscript No. (will be inserted by the editor)

Journal in Computer Virology manuscript No. (will be inserted by the editor)

Add to Reading List

Source URL: eprints.pascal-network.org

Language: English - Date: 2006-11-22 07:08:15
320Managing Alerts in a Multi-Intrusion Detection Environment Frédéric Cuppens ONERA Toulouse

Managing Alerts in a Multi-Intrusion Detection Environment Frédéric Cuppens ONERA Toulouse

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2001-10-15 21:28:12