Cargando…
Hack the stack: using snort and ethereal to master the 8 layers of an insecure network
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress Pub
2006
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1539098 |
_version_ | 1780929794111700992 |
---|---|
author | Gregg, Michael Watkins, Stephen |
author_facet | Gregg, Michael Watkins, Stephen |
author_sort | Gregg, Michael |
collection | CERN |
id | cern-1539098 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2006 |
publisher | Syngress Pub |
record_format | invenio |
spelling | cern-15390982021-04-21T22:47:40Zhttp://cds.cern.ch/record/1539098engGregg, MichaelWatkins, StephenHack the stack: using snort and ethereal to master the 8 layers of an insecure network Computing and ComputersSyngress Puboai:cds.cern.ch:15390982006 |
spellingShingle | Computing and Computers Gregg, Michael Watkins, Stephen Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title | Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title_full | Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title_fullStr | Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title_full_unstemmed | Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title_short | Hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
title_sort | hack the stack: using snort and ethereal to master the 8 layers of an insecure network |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1539098 |
work_keys_str_mv | AT greggmichael hackthestackusingsnortandetherealtomasterthe8layersofaninsecurenetwork AT watkinsstephen hackthestackusingsnortandetherealtomasterthe8layersofaninsecurenetwork |