Intrusion

Results: 1878



#Item
461Computing / Public safety / GFI Software / Windows Security Log / Windows / Network security / Backup / Event Viewer / Log monitor / Computer security / Security / Data security

GFI White Paper How to perform network-wide security event log monitoring Using GFI EventsManager™ for intrusion detection and essential auditing of security event logs

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-05 06:16:02
462Historical geology / Cratons / Structural geology / Gawler craton / Regolith / Layered intrusion / Geological unit / Granite / Saprolite / Geology / Economic geology / Sedimentology

Basement rocks of the Streaky Bay area, South Western Eyre Peninsula, are Late Archean to Mesoproterozoic crystalline igneous units of the Gawler Craton

Add to Reading List

Source URL: www.crcleme.org.au

Language: English - Date: 2009-01-14 01:20:09
463Earth / Aquifers / Hydraulic engineering / Geotechnical engineering / Hydrogeology / Groundwater / Saltwater intrusion / Water table / Spring / Water / Hydrology / Physical geography

Denmark – Shandong Groundwater Partnership Lars Skov Andersen på vegne af GEUS – WeDoChina 1

Add to Reading List

Source URL: danishwaterforum.dk

Language: English - Date: 2015-02-12 08:28:27
464Multi-agent systems / Automated planning and scheduling / Reasoning system / Procedural reasoning system / Hierarchical task network / Planning / Artificial intelligence / Cognitive architecture / Problem solving

Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Add to Reading List

Source URL: rpgoldman.goldman-tribe.org

Language: English - Date: 2009-08-06 12:04:58
465Lists by country

Final NYSDOH CEH BEEI Soil Vapor Intrusion Guidance October 2006 Appendix C Volatile organic chemicals in air —

Add to Reading List

Source URL: www.health.ny.gov

Language: English - Date: 2006-10-30 11:56:11
    466Building biology / Occupational safety and health / Soil contamination / Pollutants / Air pollution / Vapor intrusion / Volatile organic compound / Water vapor / Indoor air quality / Pollution / Chemistry / Environment

    Final NYSDOH CEH BEEI Soil Vapor Intrusion Guidance October 2006 Appendix H NYSDOH fact sheets related to soil vapor intrusion

    Add to Reading List

    Source URL: www.health.ny.gov

    Language: English - Date: 2006-10-30 11:56:29
    467Pollutants / Air pollution / Vapor intrusion / Water pollution / Environmental remediation / Water vapor / Soil vapor extraction / Trichloroethylene / Volatile organic compound / Pollution / Environment / Soil contamination

    FINAL Guidance for Evaluating Soil Vapor Intrusion in the State of New York October 2006

    Add to Reading List

    Source URL: www.health.ny.gov

    Language: English - Date: 2006-10-30 11:56:32
    468Software engineering / Inter-process communication / Common Object Request Broker Architecture / Component-based software engineering / Object-oriented programming / Intrusion tolerance / Fault-tolerant system / Byzantine fault tolerance / Computer security / Computing / Fault tolerance / Fault-tolerant computer systems

    Intrusion Tolerant CORBA: Beyond Fault Tolerance DOCsec2001 Annapolis, MD March 29, 2001

    Add to Reading List

    Source URL: www.omg.org

    Language: English - Date: 2009-05-28 13:16:01
    469System software / Computer security / Intrusion detection system / Snort / Node / Peer-to-peer / ANts P2P / Blacklist / Microsoft SQL Server / Computing / Software / Computer network security

    Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford ∗

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2004-11-17 13:32:19
    470Computer security / Snort / McAfee / Malware / Intrusion prevention system / Intrusion detection system / Microsoft Security Essentials / Sourcefire / Computer network security / Software / System software

    White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-10-20 18:39:36
    UPDATE