Cargando…

Network Intrusion Detection, Third Edition /

The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Northcutt, Stephen (Autor), Novak, Judy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sams, 2002.
Edición:3rd edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1100899573
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 150903s2002 xx o 000 0 eng d
040 |a CEF  |b eng  |e pn  |c CEF  |d CNNAI  |d OCLCF  |d OCLCO  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 858429987 
020 |z 0735712654 
020 |z 9780735712652 
024 8 |a 0735712654 
035 |a (OCoLC)1100899573  |z (OCoLC)858429987 
050 4 |a TK5105.59  |b .N475 2003 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Northcutt, Stephen,  |e author. 
245 1 0 |a Network Intrusion Detection, Third Edition /  |c Northcutt, Stephen. 
250 |a 3rd edition. 
264 1 |b Sams,  |c 2002. 
300 |a 1 online resource (512 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 50.00 
520 |a The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. 
542 |f Copyright © 2003 by New Riders Publishing  |g 2003 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
700 1 |a Novak, Judy,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0735712654/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP