network-based intrusion detection

  • 61Deep packet inspection — (DPI) (also called complete packet inspection and Information eXtraction IX ) is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for… …

    Wikipedia

  • 62Antivirus software — Antivirus redirects here. For antiviral medication, see Antiviral drug. Antivirus or anti virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and… …

    Wikipedia

  • 63Bypass switch — A Bypass Switch is a hardware device that provides a fail safe access port for an in line monitoring appliance such as an intrusion prevention system (IPS), firewall, WAN optimization device or unified threat management system. In line monitoring …

    Wikipedia

  • 64Managed security service — In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP) [1] Also Managed security services (MSS) …

    Wikipedia

  • 65Operating system — Operating systems …

    Wikipedia

  • 66Data loss prevention software — Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content… …

    Wikipedia

  • 67Snort (software) — Infobox Software name = Snort caption = collapsible = author = developer = Sourcefire, Inc. released = latest release version = 2.8.3 latest release date = September 5, 2008 latest preview version = latest preview date = frequently updated =… …

    Wikipedia

  • 68List of Linux distributions — This page provides general information about notable Linux distributions in the form of a categorized list. Distributions are organized into sections by the major distribution they are based on, or the package management system they are based… …

    Wikipedia

  • 69Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… …

    Wikipedia

  • 70Ad-hoc On-demand Distance Vector — AODV (pour Ad hoc On Demand Distance Vector) est un protocole de routage destiné aux réseaux mobiles (en mode ad hoc). Il est à la fois capable de routage Unicast et Multicast. Il est libre de boucle, auto démarrant et s accommode d un grand… …

    Wikipédia en Français