Network intrusion detection, Third edition
<p align="justify"> <font face="Times New Roman"><span style="font-size: 14px;"> </span><span style="font-size: 14px;">This book is a training aid and r...
Lưu vào:
Tác giả chính: | |
---|---|
Định dạng: | TK |
Ngôn ngữ: | eng |
Thông tin xuất bản: |
New Riders Publishing, 2002
|
Chủ đề: | |
Truy cập trực tuyến: | https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648 |
Từ khóa: |
Thêm từ khóa bạn đọc
Không có từ khóa, Hãy là người đầu tiên gắn từ khóa cho biểu ghi này!
|
id |
5648 |
---|---|
record_format |
dspace |
spelling |
56482021-12-23T01:59:16Z Network intrusion detection, Third edition Stephen Northcutt, Judy Novak Network programming <p align="justify"> <font face="Times New Roman"><span style="font-size: 14px;"> </span><span style="font-size: 14px;">This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters</span></font><br></p> New Riders Publishing, 2002 2021-12-23T01:59:16Z TK pdf https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648 eng |
institution |
Trường Đại học Công Thương Thành phố Hồ Chí Minh |
collection |
LibHUIT |
language |
eng |
topic |
Network programming |
spellingShingle |
Network programming Stephen Northcutt, Judy Novak Network intrusion detection, Third edition |
description |
<p align="justify"> <font face="Times New Roman"><span style="font-size: 14px;"> </span><span style="font-size: 14px;">This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters</span></font><br></p> |
format |
TK |
author |
Stephen Northcutt, Judy Novak |
author_facet |
Stephen Northcutt, Judy Novak |
author_sort |
Stephen Northcutt, Judy Novak |
title |
Network intrusion detection, Third edition |
title_short |
Network intrusion detection, Third edition |
title_full |
Network intrusion detection, Third edition |
title_fullStr |
Network intrusion detection, Third edition |
title_full_unstemmed |
Network intrusion detection, Third edition |
title_sort |
network intrusion detection, third edition |
publisher |
New Riders Publishing, 2002 |
url |
https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648 |
work_keys_str_mv |
AT stephennorthcuttjudynovak networkintrusiondetectionthirdedition |
_version_ |
1773021619024822272 |