Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack"--The seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Gregg, Michael (Michael C.), Watkins, Stephen (Information security professional) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress Pub.,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Publicado: (2006) -
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Publicado: (2006) -
Web application security is a stack : how to CYA (cover your apps) completely /
por: MacVittie, Lori A., 1969-
Publicado: (2015) -
BUILDING NEXT-GEN SOC WITH IBM QRADAR accelerate your security operations and detect cyber threats effectively /
por: KOTHEKAR, ASHISH M.
Publicado: (2023) -
Hands-on threat modeling /
Publicado: (2022)