perimeter intrusion detection

perimeter intrusion detection
Безопасность: обнаружение вторжения по периметру (ограждения)

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "perimeter intrusion detection" в других словарях:

  • Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… …   Wikipedia

  • Cochin International Airport — For the regional airport near Kōchi, Japan, see Kōchi Ryōma Airport. Cochin International Airport കൊച്ചി അന്താരാഷ്ട്ര വിമാനത്താവളം Nedumbassery Airport …   Wikipedia

  • Magal Security Systems — Ltd. Type Public (NASDAQ: MAGS),(TASE: MAGS) Industry Security …   Wikipedia

  • Commtel Networks — Pvt Ltd. Type Privately held company Industry Telecommunication, Surveillance Founded July, 1998 …   Wikipedia

  • Covenant Aviation Security — Type LLC Industry Security Founded 2002 Headquarters Chicago, Illinois, U.S.A. Key people Gerald L. Berry, President …   Wikipedia

  • Distributed firewall — A firewall is system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect inside network from outside network. It may be a hardware device or a software… …   Wikipedia

  • Managed security service — In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP) [1] Also Managed security services (MSS) …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Angela Orebaugh — (1973) is a security technologist, scientist, and author. She is the author of the Syngress Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing . She is also known for her work as a researcher, writer, and… …   Wikipedia

  • Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… …   Wikipedia

  • SANS Institute — The SANS Institute (SysAdmin, Audit, Networking, and Security) is a trade name owned by the for profit Escal Institute of Advanced Technologies. SANS provides computer security training, professional certification, and a research archive. It was… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»