P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

parent processes
passwords, OTPs
pattern detection
pattern matching, regular expressions
pattern-based security policies
PCs, zombies
peer-to-peer networks
permissive systems
persistence process
     application execution
     file modification
     system configuration
personal firewalls
phases of deployment
    for CSA
         conducting pilot tests
         finalizing the project
         full deployment
         implementing management
         predeployment planning
         selection and classification of target hosts
         tuning
         understanding the product
     for IPS
         finalizing the project
         predeployment planning 2nd
         sensor deployment
         tuning
         understanding the product
pilot test, conducting 2nd
placing IPS sensors in network
policy groups
     configuring
     secondary groups
port security
PortMapper
predeployment planning phase of IPS deployment
processing capacity as sensor selection criteria
promiscuous mode sensor operation 2nd
     capturing network traffic
protocol decodes 2nd
Pull model (management console)
Push model (management console)




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net