home *** CD-ROM | disk | FTP | other *** search
/ Developer Source 17 / Developer Source Volume 17 (I-MODE Publications, Inc.)(2000).iso / softw / sep97 / 1p90.gif < prev   
Graphics Interchange Format  |  1998-02-10  |  39.5 KB  |  577x308  |  4-bit (16 colors)
   ocr: Police Stake-out Surveillance. Camera A successful security policy: depends on monitoring. A variety of software eroentage of external access requests that are: tools can provide IS managers with continuous scrutiny, of security-related discourected oue 10 inproper password activities affecting their systens and networks. External hack attempts, failed log-ons, attempted internal accesses: to restricted files and other 25 potential threat signais can. be monitored in real time. Here is a sampler of a digital cop's armament: 20: 15 Radar Guns 105 Some of the: secunty-related 3 Hack Traffic atle ...