Listing 1 - 1 of 1 |
Sort by
|
Choose an application
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features. The accompanying CD contains examples from real attacks allowing rea
Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Computers -- Access control. --- Intrusion detection systems (Computer security) --- Computers --- Computer security --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Access control --- Computer networks --- Security measures. --- Access control. --- Snort (Computer file) --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Snort (Software) --- Information Technology --- General and Others
Listing 1 - 1 of 1 |
Sort by
|