Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

TCP connections

     resetting

     three-way handshake

TCP Reset interface

TCP/IP

threats to security, evolution of

     client-server computing 2nd

     Internet

     mobile computing

     wireless connnectivity

three-way handshake

tiered management model

traffic flows

traffic mirroring

traffic normalization

triggers

     anomaly-based detection

     behavior-based detection

     pattern detection

Trojan horses

     rootkits

true negatives

true positives

tuning phase of CSA deployment

Категории