Network intrusion detection, Third edition

<p align="justify">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font face="Times New Roman"><span style="font-size: 14px;">&nbsp;&nbsp;</span><span style="font-size: 14px;">This book is a training aid and r...

Mô tả chi tiết

Lưu vào:
Hiển thị chi tiết
Tác giả chính: Stephen Northcutt, Judy Novak
Định dạng: TK
Ngôn ngữ:eng
Thông tin xuất bản: New Riders Publishing, 2002
Chủ đề:
Truy cập trực tuyến:https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648
Từ khóa: Thêm từ khóa bạn đọc
Không có từ khóa, Hãy là người đầu tiên gắn từ khóa cho biểu ghi này!
id 5648
record_format dspace
spelling 56482021-12-23T01:59:16Z Network intrusion detection, Third edition Stephen Northcutt, Judy Novak Network programming <p align="justify">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font face="Times New Roman"><span style="font-size: 14px;">&nbsp;&nbsp;</span><span style="font-size: 14px;">This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters</span></font><br></p> New Riders Publishing, 2002 2021-12-23T01:59:16Z TK pdf https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648 eng
institution Trường Đại học Công Thương Thành phố Hồ Chí Minh
collection LibHUIT
language eng
topic Network programming
spellingShingle Network programming
Stephen Northcutt, Judy Novak
Network intrusion detection, Third edition
description <p align="justify">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font face="Times New Roman"><span style="font-size: 14px;">&nbsp;&nbsp;</span><span style="font-size: 14px;">This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters</span></font><br></p>
format TK
author Stephen Northcutt, Judy Novak
author_facet Stephen Northcutt, Judy Novak
author_sort Stephen Northcutt, Judy Novak
title Network intrusion detection, Third edition
title_short Network intrusion detection, Third edition
title_full Network intrusion detection, Third edition
title_fullStr Network intrusion detection, Third edition
title_full_unstemmed Network intrusion detection, Third edition
title_sort network intrusion detection, third edition
publisher New Riders Publishing, 2002
url https://thuvien.huit.edu.vn/digitaldocument/detail?treeid=-1&fileid=5648
work_keys_str_mv AT stephennorthcuttjudynovak networkintrusiondetectionthirdedition
_version_ 1773021619024822272