Examples of using Host-based in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
See also host-based licensing.
Host-based card emulation overview.
OSSEC, an open-source host-based intrusion detection system.
Host-based intrusion-detection system.
How does Microsoft define host-based failover clustering?
Host-based intrusion detection(HIDS).
Disable-access Disable host-based access control provided by mod_access.
Host-based iSCSI initiators establish connections to each target.
Common security device functions, such as IDS/IPS, Network and Host-based firewalls, etc.
Host-based multiradio modules with Wi-Fi, Bluetooth,& NFC.
Network monitoring offers several advantages over traditional host-based intrusion detection systems.
Both host-based access restrictions and password-based authentication may be implemented simultaneously.
By slitting machine speed as the host-based, making same speed on whole line through PLC system.
Hardware-based security provides portability and superior encryption over host-based software encryption.
VMware NSX Maintain host-based security with fine-grained network controls and micro-segmentation.
The latter variant of virtual hosts is sometimes also called host-based or non-IP virtual hosts.
They configure host-based and user-based security for the service.
All other items created by decomposition are set to knockout and sent through the default QuarkXPress trapping during host-based separations.
The Design and Implementation of Host-Based Intrusion Detection System.
Maintain host-based security with fine-grained network controls and micro-segmentation with VMware NSX Data Center.
Deploy as a standalone vulnerability scanner, distributed throughout an environment, as a host-based solution, and integrated with Enterprise Vulnerability Management for enterprise deployments.
In a host-based system, the sensor usually consists of a software agent, which monitors all activity of the host on which it is installed.
(Network services) Configure host-based and user-based security for the service.
Uses host-based, user-based, and cryptographic security techniques to control access to standard network services. Red Hat Enterprise Linux.
You can also use agent-based backups to protect host Windows operating system and host-based applications, as well as to protect Virtual Machines that use passthrough disks and/or guest-initiated iSCSI.
Acronis Backup Advanced combines agentless, image-based backups with deep Windows Hyper-V integration to protect your entiresetup- the Virtual Machines, virtual application, the Windows host operating systems and even host-based applications.
Easy-to-configure host-based firewall, active directory integration, and trusted boot, further secure your ztC Edge environment.
Because it's ahardened system with restricted USB ports, default secure communications settings, and easy-to-configure security features like a host-based firewall, even those that aren't security experts can quickly and easily secure their ztC Edge environment.