Hack the stack: using Snort and Ethereal to master the 8 layers of an insecure network/
Main Author: | GREGG, Michael C. |
---|---|
Other Authors: | WATKINS, Stephen |
Format: | Book |
Language: | English |
Published: |
Rockland, MA:
a unique and refreshing look at network security Syngress,
c2006
|
Subjects: |
Similar Items
-
Protect your Windows network: from perimeter to data/
by: JOHANSSON, Jesper M.
Published: (2005) -
Inside network security assesment: guarding your IT infrastructure/
by: GREGG, Michael C.
Published: (2006) -
How to cheat at managing information security/
by: OSBORME, Mark
Published: (2006) -
Penetration tester's: open source toolkit/
by: Bayles, Aaron W.
Published: (2006) -
Βασικές αρχές ασφάλειας δικτύων/
by: Stallings, William
Published: (2011)