Cargando…
Hack the stack: using snort and ethereal to master the 8 layers of an insecure network
Autores principales: | Gregg, Michael, Watkins, Stephen |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress Pub
2006
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1539098 |
Ejemplares similares
-
Snort cookbook
por: Orebaugh, Angela, et al.
Publicado: (2005) -
Nessus, Snort, & Ethereal power tools: customizing open source security applications
por: Archibald, Neil
Publicado: (2005) -
Intrusion detection with Snort
por: Koziol, Jack
Publicado: (2003) -
Managing security with Snort and IDS tools
por: Cox, Kerry, et al.
Publicado: (2004) -
Snort Intrusion Detection and Prevention Toolkit
por: Caswell, Brian, et al.
Publicado: (2007)