| 1. | Design and implementation of host intrusion prevention system 主机入侵防护系统的设计与实现 |
| 2. | Intrusion prevention system , ips 入侵防护系统 |
| 3. | Consider implementing intrusion prevention software for mission - critical boxes 考虑为任务-临界盒执行入侵预防软件。 |
| 4. | Intrusion prevention system 入侵防御系统 |
| 5. | It involves technology , management , usage and etc . the technique of intrusion detection and intrusion prevention has become the new generation information security technique 网络信息系统的安全问题是一个十分复杂的问题,涉及到技术、管理、使用等许多方面。 |
| 6. | It can be said that the software really improved the initial ms phone security system , following the anti - virus capabilities , also have a real network intrusion prevention capabilities 1 . 23 mb可以说这个软件真正初步完善了ms手机上的安全体系,继防病毒能力之后,真正也具备了防范网络入侵的能力。 |
| 7. | Announced a software upgrade for idp product line that makes it the first intrusion prevention platform to protect against exploitation of instant messaging and peer - to - peer file sharing application vulnerabilities 宣布对idp全线产品进行了软件升级,使之成为业界第一个能够针对即时通讯程序所产生的漏洞和对等网络文件共享应用缺陷提供保护的入侵预防平台。 |
| 8. | Sixthly , one cluster - based intrusion prevention system ( briefly named cbips ) is presented . the experimentation prototype of the cbips shows that it can improve the performance of network attack prevention by using multi - computer for parallel process 提出了一个基于机群网络入侵阻断系统( cluste卜basedintrusionpreventionsystem ) ,简称cbips . cbips实验原型系统表明, cbaps利用多台计算机并行工作,提高网络攻击阻断性能。 |