Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks /
"An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events. Where do you begin? A good star...
Call Number: | Libro Electrónico |
---|---|
Other Authors: | Messier, Ric (Speaker) |
Format: | Electronic Video |
Language: | Inglés |
Published: |
[Place of publication not identified] :
O'Reilly,
[2016]
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Similar Items
-
Intrusion detection with Snort /
by: Koziol, Jack
Published: (2003) -
Intrusion detection networks : a key to collaborative security /
by: Fung, Carol, et al.
Published: (2014) -
Practical intrusion analysis : prevention and detection for the twenty-first century /
by: Trost, Ryan
Published: (2010) -
Identity and access management : business performance through connected intelligence /
by: Osmanoglu, T. Ertem
Published: (2014) -
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 /
by: Williams, Barry L.
Published: (2016)