intrusion

listen to the pronunciation of intrusion
İngilizce - Türkçe
zorla içeri girme
intrüzyon
(Kanun) haksız müdahale
(Jeoloji) tabakalar arasına giren kaya
(Bilgisayar,Jeoloji) araya girme
(Bilgisayar) güvenliği kırma
(on ile) zorla girme
tecavüz
sezgi
(Kanun) Haneye tecavüz
müsaadesiz şekilde araya girme
{i} tecâvüz
tecavüz/izinsiz girme
giriş
(Askeri) Bak. "elektromagnetic intrusion"
{i} ihlal
{i} izinsiz girme

Lütfen izinsiz girmemi affedin ama bu duymak isteyeceğiniz bir şey. - Please forgive my intrusion, but this is something that you're going to want to hear.

{i} izinsiz ve davetsiz girme
girme

Lütfen izinsiz girmemi affedin ama bu duymak isteyeceğiniz bir şey. - Please forgive my intrusion, but this is something that you're going to want to hear.

(Diş Hekimliği) bir dişin alveol kemiği içine itilmesi durumu
sokulum
{i} zorla girme
{i} davetsiz gelme
(Dilbilim) ekleme
(Kanun) fuzuli işgal etme
intrusion detection
saldırı tespit
intrusion alarm
(Askeri) Davetsiz girenleri ihbar eden alarm
intrusion currency
(Askeri) ASKERİ PARA, İSTİLA PARASI: Bak. "military currency" ve "occupancy currency"
intrusion detection
(Askeri) mütecavizi tespit
intrusion errors
(Pisikoloji, Ruhbilim) araya girme hataları
intrusion tone
(Bilgisayar) araya girme sinyali telefon
intrusion tone
araya girme sinyali (telefon)
intrusion tone
araya girme sinyali
interference; intrusion
girişim; saldırı
ıntrusion
zorla girme
electromagnetic intrusion
(Askeri) ELEKTROMANYETİK ENGELLEME: Operatörleri yanıltmak veya karışıklığa neden olmak amacıyla, iletişim hatlarına kasıtlı olarak elektromanyetik enerjinin herhangi bir yolla sokulması. Bak. "electronic warfare"
level of intrusion
(Askeri) sızma seviyesi
meaconing, interference, jamming, and intrusion
(Askeri) şaşırtma, müdahale, karıştırma ve sızma
salt water intrusion
tuzlu su karışması
İngilizce - İngilizce
The forcible inclusion or entry of an external group or individual; the act of intruding

He viewed sales calls as an unwelcome intrusion.

the act of entering without warrant or invitation; encroachment
The technology equivalent of trespassing An uninvited and unwelcome entry into a system by an unauthorized source While Incursions are always seen as hostile, intrusions may well be innocent, having occurred in error Strong verification and security systems can minimize intrusions
{i} entry by force or without permission; encroachment, infringement, trespass
Emplacement of magma (molten rock) into preexisting rock Dikes, sills, and batholiths are intrusions
rock produced by an intrusive process
entrance by force or without permission or welcome
mass of igneous rock that has formed by the 'injection' of molten rock, magma, into existing cracks beneath the surface of the earth
A mass of igneous rock formed by the consolidation of magma intruded into other rocks, in contrast to lavas, which are extruded upon the surface
The distance into the fuze well which a fuze extends when it is fly screwed in
where molton rock pushes its way between rock layers or through rock layers
a body of igneous rock which has forced itself into pre-existing rocks, either along some definite structural feature, or by deformation and cross-cutting of the invaded rocks - BACK>>
In geology, a mass of igneous rock which was forced into other, older, rocks while in a molten condition
entry to another's property without right or permission
The penetrating of one rock, while in a plastic or metal state, into the cavities of another
Any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource
any entry into an area not previously occupied; "an invasion of tourists"; "an invasion of locusts"
Attempts to compromise the integrity, availability, or confidentiality of a resource
The entry of a stranger, after a particular estate or freehold is determined, before the person who holds in remainder or reversion has taken possession
An invasion of privacy committed when one individual intrudes upon or invades the solitude of another individual
Type of signal that is activated by a motion detector, door contact, glassbreak detector or other devices used to detect unauthorized entry These are only activated when the system is armed
The settlement of a minister over a congregation without their consent
If someone disturbs you when you are in a private place or having a private conversation, you can call this event an intrusion. I hope you don't mind this intrusion, Jon
the forcing of molten rock into fissures or between strata of an earlier rock formation
In WindView, intrusion refers to the amount of overhead added to the target IRIX system by including instrumented code and starting event logging
1 Injection of a magma into a pre-existing rock 2 A body of rock resulting from the process of intrusion
An intrusion is something that disturbs your mood or your life in a way you do not like. I felt it was a grotesque intrusion into our lives
The intentional insertion of electromagnetic energy into transmission paths in any manner with the objective of deceiving operators or of causing confusion
entrance by force or without permission or welcome rock produced by an intrusive process the forcing of molten rock into fissures or between strata of an earlier rock formation
Attacks or attempted attacks from outside the security perimeter of an IS
the entry, by force , of melted rock into or between other rock formations
The act of intruding, or of forcing in; especially, the forcing (one's self) into a place without right or welcome; encroachment
intrusion detection
a security requirement specifying the degree to which an application must ensure attempted access or modification by unauthorized individuals is detected and properly handled
intrusion detection
The ability to detect if a hacker or cracker has gained access to a computer
intrusion detection
Software that looks at who tries to break in and reports on these attempts
intrusion detection
Snort - Open source, lightweight network intrusion detection system with a large database of signatures
intrusion detection
Pertaining to techniques which attempt to detect intrusion into a computer or network by observation of actions, security logs, or audit data Detection of break-ins or attempts either manually or via software expert systems that operate on logs or other information available on the network
intrusion detection
A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner
intrusion detection
A security service that monitors and analyzes system events to find and provide real-time or near real-time attempt warnings to access system resources in an unauthorized manner This is the detection of break-ins or break-in attempts, by reviewing logs or other information available on a network
intrusion detection
Pertaining to techniques which attempt to detect intrusion into a computer or network by observation of actions, security logs, or audit data
intrusion detection
System tools designed to recognize unauthorized and malicious entry into a network or host, including monitoring for suspicious packet traffic, tracking intruders and identifying where the security hole is Many intrusion detection tools can also detect a variety of misuse originating from inside the network
intrusion detection
Detection of break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network
intrusion detection
Detection of system penetration or attempted penetration, via manual or software expert systems that observe actions, security logs, or audit data
intrusion detection
techniques designed to detect breaches into a computer system or network
intrusion detection
A mechanism to detect when an attack is attempted against a network protected by ISA Server
intrusion detection
Detection of break-ins or break-in attempts either manually via software expert systems that operate on logs or other information available on the network
intrusion detection
The process of detecting break-in attempts from unauthorized users Log files are often the source material for intrusion detection
intrusion detection
A method or process to detect the break-ins or attempts to attack via the use of software systems which operate on the network Intrusion detection systems often combine the network monitoring with real-time capture and analysis in order to identify for attacks
intrusion-tracking dirt road
road which runs parallel to a security fence
layered intrusion
a large body of igneous rock within which distinct stratification continues over many miles
ıntrusion
{n} the act of intruding, an encroachment
electromagnetic intrusion
the deliberate insertion of electromagnetic energy into transmission paths with the objective of confusing or deceiving operators
intrusions
plural of intrusion
intrusion