Managing security with Snort and IDS tools /
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprintin...
Call Number: | Libro Electrónico |
---|---|
Main Author: | Cox, Kerry |
Other Authors: | Gerg, Christopher |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Beijing ; Cambridge :
O'Reilly,
©2004.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Similar Items
-
Snort 2.0 intrusion detection /
by: Beale, Jay
Published: (2003) -
Snort 2.0 intrusion detection /
by: Beale, Jay
Published: (2003) -
Snort 2.1 intrusion detection /
by: Baker, Andrew R.
Published: (2004) -
Snort Intrusion Detection 2.0.
by: Russell, Ryan
Published: (2003) -
Cybersecurity pevention and detection (Video collection).
Published: (2022)