共查询到15条相似文献,搜索用时 0 毫秒
1.
防火墙和传统入侵检测系统(IDS)等安全性产品只能提供部分保护功能。而真正保护网络资产需要投入大量的时间和资源来收集安全性信息。SYMANTEC MANHUNT可以 相似文献
2.
3.
4.
7.
8.
9.
10.
基于Symantec Ghost企业版的局域网管理实现 总被引:2,自引:0,他引:2
赛门铁克公司的Ghost企业版能够提供给系统管理员更灵活的操作系统配置解决方案和全面的PC管理,强大约功能使其完全能够胜任企业、政府、学校等部门的计算机系统管理。本文介绍了Chost企业版的独特的管理实现机制,并给出了一个基于Symantec Ghost企业版的公共机房管理的例子。 相似文献
11.
郑皓 《网络安全技术与应用》2006,(12):72-74
本文从Symantec Antivirus企业版客户端杀毒软件对注册表的依赖这一缺陷谈起,描述了更改相应的键值后直接引发软件设置变化的这一缺陷,以及造成的影响,并提出了解决的办法,最后简述了本人对杀毒软件的完善及防毒机制的几点想法。 相似文献
12.
《Behaviour & Information Technology》2012,31(1-2):36-44
Abstract This paper discusses the process of planning, building, and managing the usability laboratory at Symantec Corporation. It describes how an effective lab can be built for about $55,000 in equipment and furniture costs, and discusses issues and trade-offs surrounding the key components: room layout, environmental considerations, cabling, one-way mirrors, furniture, video and audio equipment, and data loggers. In addition, one working solution to the subsequent management of a lab with limited staffing and tight product schedules is described. 相似文献
13.
Kathy M. Uyeda 《Behaviour & Information Technology》1994,13(1):36-44
This paper discusses the process of planning, building, and managing the usability laboratory at Symantec Corporation. It describes how an effective lab can be built for about $55,000 in equipment and furniture costs, and discusses issues and trade-offs surrounding the key components: room layout, environmental considerations, cabling, one-way mirrors, furniture, video and audio equipment, and data loggers. In addition, one working solution to the subsequent management of a lab with limited staffing and tight product schedules is described. 相似文献
14.
《Network Security》2003,2003(4):5-7
Knowledge is power — never more so than when it comes to security. Knowing what the threats are, and where vulnerabilities lie, will make the difference between a successful defence and an expensive security breach. 相似文献
15.
随着企业网规模的不断发展,信息安全问题越来越突出.分析了目前大型企业网络中存在的各种安全隐患,提出通过接入端点控制策略来保护企业网络和计算机的信息安全,并结合产品应用介绍了一种基于Symantec SEP技术的信息安全解决方案. 相似文献