intrusion detection processing

intrusion detection processing
działanie systemu wykrywania infiltracji
przetwarzanie służące do wykrywania włamań

English-Polish dictionary of Electronics and Computer Science. 2013.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… …   Wikipedia

  • Détection de personne — Un exemple de détection de personnes sur une voie de circulation La détection de personne est un domaine de la vision par ordinateur consistant à détecter un humain dans une image numérique. C est un cas particulier de détection d objet, où l on… …   Wikipédia en Français

  • Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… …   Wikipedia

  • Change detection — In statistical analysis, change detection tries to identify changes in the probability distribution of a stochastic process or time series. In general the problem concerns both detecting whether or not a change has occurred, or whether several… …   Wikipedia

  • Diver Detection Sonar — (DDS) systems are sonar and acoustic location systems employed underwater for the detection of divers and submerged swimmer delivery vehicles (SDVs). The purpose of this type of sonar system is to provide detection, tracking and classification… …   Wikipedia

  • Motion detection — is a process of confirming a change in position of an object relative to its surroundings or the change in the surroundings relative to an object. This detection can be achieved by both mechanical and electronic methods. In addition to discrete,… …   Wikipedia

  • Система обнаружения вторжений — (СОВ)  программное или аппаратное средство, предназначенное для выявления фактов неавторизованного доступа в компьютерную систему или сеть либо несанкционированного управления ими в основном через Интернет. Соответствующий английский… …   Википедия

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Military equipment of Turkey — The military equipment of Turkey includes a wide array of arms, artilleries, large surface vessels, cannons, armored vehicles, mortars, unmanned vehicles and many different equipments. Contents 1 Historical development 1.1 General 1.2 1923 1950 …   Wikipedia

  • Distributed firewall — A firewall is system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect inside network from outside network. It may be a hardware device or a software… …   Wikipedia

  • система — 4.48 система (system): Комбинация взаимодействующих элементов, организованных для достижения одной или нескольких поставленных целей. Примечание 1 Система может рассматриваться как продукт или предоставляемые им услуги. Примечание 2 На практике… …   Словарь-справочник терминов нормативно-технической документации

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”