Device for and Method of Computer Intrusion Anticipation, Detection, and Remediation

TBMG-27801

11/01/2017

Abstract
Content

Initially, relatively powerful computers were constructed as unique mainframes operated by larger corporations on isolated networks. Then, computers with modest amounts of computing power were made available to individuals as standalone personal computers. The computing power of personal computers and the applications for which they could be used were increased by networking them with other computers throughout the world using ancillary devices (e.g., servers, routers, links, switches, hubs, etc.). An arrangement into which computer and ancillary devices are configured is called a topology. There are many different types of topologies (e.g., bus, ring, star, tree, mesh, etc.).

Meta TagsDetails
Citation
"Device for and Method of Computer Intrusion Anticipation, Detection, and Remediation," Mobility Engineering, November 1, 2017.
Additional Details
Publisher
Published
Nov 1, 2017
Product Code
TBMG-27801
Content Type
Magazine Article
Language
English