Listing 1 - 3 of 3 |
Sort by
|
Choose an application
681.3*K65 --- Computer networks --- Computers --- Computer security --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures. --- Access control. --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- IDSs (Intrusion detection systems) --- Security measures --- Access control --- Snort (Software)
Choose an application
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features. The accompanying CD contains examples from real attacks allowing rea
Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Computers -- Access control. --- Intrusion detection systems (Computer security) --- Computers --- Computer security --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Access control --- Computer networks --- Security measures. --- Access control. --- Snort (Computer file) --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Snort (Software) --- Information Technology --- General and Others
Choose an application
681.3*K65 --- Computer security. --- Computers --- Computer networks --- Computer security --- -Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Access control. --- Security measures. --- Access control --- Security measures --- Distributed processing --- Snort (Computer file) --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- IDSs (Intrusion detection systems) --- Snort (Software)
Listing 1 - 3 of 3 |
Sort by
|