|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn956315086 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
160808s2016 xx 169 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCA
|d OCLCO
|
035 |
|
|
|a (OCoLC)956315086
|
037 |
|
|
|a CL0500000768
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e speaker.
|
245 |
1 |
0 |
|a Understanding intrusion detection systems :
|b detecting attackers and incidents inside your hosts and networks /
|c with Ric Messier.
|
246 |
3 |
0 |
|a Detecting attackers and incidents inside your hosts and networks
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c [2016]
|
300 |
|
|
|a 1 online resource (1 streaming video file (2 hr., 48 min., 30 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from title screen (viewed July 28, 2016).
|
500 |
|
|
|a Date of publication from resource description page.
|
511 |
0 |
|
|a Presenter, Ric Messier.
|
520 |
|
|
|a "An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events. Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781491962701/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|