NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...ceptable use policy. It also may be a precursor to external attacks on the network. ...[network intrusion detection system]]s have difficulty in determining if a reconnaissance activity is internal or external, and generate many false alarms causin
    2 KB (355 words) - 07:38, 4 March 2010
  • ...ay be a legitimate operational function or a precursor to an attack on the network
    207 B (32 words) - 14:10, 4 February 2009
  • {{r|Network security}}
    220 B (27 words) - 07:40, 4 March 2010

Page text matches

  • In a military and intelligence context, '''reconnaissance''' involves dissimilar concepts, either conducting potential combat ope {{rpl|Armed reconnaissance}}
    1 KB (176 words) - 09:40, 26 September 2013
  • {{r|Network address translator}} {{r|Network reconnaissance}}
    1 KB (141 words) - 12:44, 8 January 2010
  • ...ss of [[network reconnaissance]] techniques that may be part of legitimate network operations, or a probing to find vulnerabilities to attack
    182 B (25 words) - 14:55, 4 February 2009
  • ...elf without further user activity. Worms often take up valuable memory and network bandwidth, which can cause a computer to stop responding, and can also allo ...f the malware function simply performed [[reconnaissance (network)|network reconnaissance]], to determine such things as account names that could be exploited by
    5 KB (809 words) - 11:36, 31 May 2009
  • ...ceptable use policy. It also may be a precursor to external attacks on the network. ...[network intrusion detection system]]s have difficulty in determining if a reconnaissance activity is internal or external, and generate many false alarms causin
    2 KB (355 words) - 07:38, 4 March 2010
  • {{r|Network reconnaissance}}
    501 B (65 words) - 00:40, 12 January 2010
  • ...mmand, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) (January 13-14, 2003) ...mmand, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (January 13-14, 2003)
    60 KB (8,926 words) - 07:45, 6 October 2013
  • ...surveillance and reconnaissance in support of strategic operations; global network operations of the [[Global Information Grid]], [[information operations]],
    482 B (55 words) - 14:47, 16 September 2008
  • {{r|Warfighter Information Network–Tactical}} {{r|XM1201 Reconnaissance and Surveillance Vehicle}}
    834 B (109 words) - 23:59, 15 February 2011
  • ...e such as [[information operations]], [[C3I-ISR|strategic surveillance and reconnaissance]], and to minimize threats of [[weapons of mass destruction]] from othe The bombers, tankers, and reconnaissance aircraft went under the new [[Air Combat Command]], to be assigned, as
    6 KB (887 words) - 03:32, 1 December 2009
  • ...ll deployment in 2010, '''Future Combat Systems (FCS)''' is an integrated, network-centric set of techologies and equipment for enhanced warfighting by the [[ ...-line-of-sight launch system or "rockets in a box," as well as the overall networking.
    31 KB (4,614 words) - 11:39, 8 April 2011
  • ...information that traverses a [[telecommunications network]] or [[computer network]], and continues into the computers themselves. There are a wide range of s | journal = Cable News Network
    13 KB (2,006 words) - 10:18, 22 May 2010
  • **Command and Control, Intelligence, Surveillance and Reconnaissance Systems Wing **Network Centric Operations/Integration Systems Wing
    5 KB (770 words) - 03:04, 23 December 2009
  • ...mmand, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) (January 13-14, 2003)
    7 KB (1,045 words) - 11:22, 8 February 2011
  • ...mmand, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR)
    7 KB (1,013 words) - 22:23, 8 February 2011
  • {{r|Mobile ad hoc networking}} {{r|Self-organizing network}}
    2 KB (248 words) - 22:45, 11 January 2010
  • {{r|Intelligence, surveillance and reconnaissance}} {{r|Joint Network Node}}
    2 KB (303 words) - 16:34, 11 January 2010
  • ...''sled''') was an advanced, long-range, [[Mach number|Mach]] 3 strategic [[reconnaissance aircraft]] developed from the Lockheed [[Lockheed YF-12|YF-12A]] and [[ ...ending manned reconnaissance overflights of the Russian landmass. Overhead reconnaissance of the Soviet Union was taken over by satellites, but the SR-71 was alr
    53 KB (8,382 words) - 04:51, 19 April 2014
  • {{r|Mobile ad hoc networking}} {{r|Self-organizing network}}
    3 KB (362 words) - 12:46, 8 January 2010
  • ...ask force. 5SFG's role, and admittedly training, were much more in special reconnaissance than direct action. ...ing to TF11 was [[Advanced Force Operations]] (AFO), primarily a [[special reconnaissance]] under LTC Pete Blaber; AFO also included analysts and communications
    20 KB (3,059 words) - 11:50, 18 October 2013

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)