Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks /
"An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events. Where do you begin? A good star...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Messier, Ric (Orador) |
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
O'Reilly,
[2016]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Intrusion detection with Snort /
por: Koziol, Jack
Publicado: (2003) -
Intrusion detection networks : a key to collaborative security /
por: Fung, Carol, et al.
Publicado: (2014) -
Practical intrusion analysis : prevention and detection for the twenty-first century /
por: Trost, Ryan
Publicado: (2010) -
Identity and access management : business performance through connected intelligence /
por: Osmanoglu, T. Ertem
Publicado: (2014) -
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 /
por: Williams, Barry L.
Publicado: (2016)