H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

HIDS (host-based intrusion detection systems)
hierarchical management model
HIPS (host-based intrusion prevention systems) 2nd
    benefits of
         acceptable use policy enforcement
         attack prevention
         internal attack propagation prevention
         patch relief
         policy enforcement
     endpoint agents
         access control process
     limitations of, acceptable use policy enforcement
     management infrastructure
         management center
         management interface
     required capabilities
     role in layered defense
    security policies
         anomaly-based
         atomic-rule based
         behavioral
home office IPS deployment
     HIPS implementation
     limiting factors
     NIPS implementation
     security policy goals
Host IPS
     deploying
     role in layered defense
     signature tuning
host-based signatures
     atomic
     stateful
     triggering mechanisms
host-level attack mitigation
     antivirus
     HIDS
     personal firewalls
hosts, classifying
hubs
hybrid IPS/IDS systems 2nd




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net