- intrusion detection and assessment
- Техника: обнаружение и оценка несанкционированного проникновения на АЭС
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Data Analysis Techniques for Fraud Detection — Fraud is a million dollar business and it is increasing every year. The PwC global economic crime survey of 2009 suggests that close to 30% of companies worldwide reported fallen victim to fraud in the past year[1] Fraud involves one or more… … Wikipedia
Measurement and signature intelligence — (MASINT) is a branch of intelligence gathering activities. MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more… … Wikipedia
Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… … Universalium
обнаружение и оценка возможных последствий несанкционированного проникновения на АЭС — — [А.С.Гольдберг. Англо русский энергетический словарь. 2006 г.] Тематики энергетика в целом EN intrusion detection and assessment … Справочник технического переводчика
обнаружение и оценка несанкционированного проникновения на АЭС — — [А.С.Гольдберг. Англо русский энергетический словарь. 2006 г.] Тематики энергетика в целом EN intrusion detection and assessmentIDA … Справочник технического переводчика
Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… … Wikipedia
OSSIM — For the GIS project, see Open Source Geospatial Foundation. OSSIM OSSIM Web Framework Developer(s) AlienVault Stable release 3.0.0 / September 6, 2 … Wikipedia
Angela Orebaugh — (1973) is a security technologist, scientist, and author. She is the author of the Syngress Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing . She is also known for her work as a researcher, writer, and… … Wikipedia
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia
Clone Systems, Inc. — Clone Systems, Inc. Type Private Headquarters Philadelphia, Pennsylvania, USA Area served North America, Euro … Wikipedia
Midas (disambiguation) — Midas may refer to: Midas, King of Pessinus, Phrygia Midas (Shelley), an 1820 play by Mary Shelley and Percy Bysshe Shelley Midas, a rich patron of the arts in the operetta Die schöne Galathee, by Franz von Suppé European Association of Daily… … Wikipedia