СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 334
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Snort IDS and IPS Toolkit
/ Комментариев: 0/


Название: Snort IDS and IPS Toolkit
Автор: Brian Caswell, Jay Beale, Andrew Baker
Издательство: Syngress Publishing
Год: 2007
Формат: PDF
Страниц: 766
Размер: 10,79 МБ
Язык: English

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications
/ Комментариев: 0/


Название: Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications
Автор: Neil Archibald, Gilbert Ramirez, Noam Rathaus
Издательство: Syngress Publishing
Год: 2005
Формат: PDF
Страниц: 472
Размер: 10,13 МБ
Язык: English

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source security tools.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Snort 2.1 Intrusion Detection, Second Edition
/ Комментариев: 0/


Название: Snort 2.1 Intrusion Detection, Second Edition
Автор: Brian Caswell, Jay Beale
Издательство: Syngress Publishing
Год: 2004
Формат: PDF
Страниц: 753
Размер: 12,63 МБ
Язык: English

Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.
Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Nessus Network Auditing
/ Комментариев: 0/


Название: Nessus Network Auditing
Автор: Renaud Deraison, Haroon Meer, Roelof Temmingh, Charl van der Walt, Raven Alder, Jimmy Alderson, Andy Johnston, George A. Theall
Издательство: Syngress Publishing
Год: 2004
Формат: PDF
Страниц: 545
Размер: 10,5 МБ
Язык: English

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Black Hat: Misfits, Criminals, and Scammers in the Internet Age
/ Комментариев: 0/


Название: Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Автор: John Biggs
Издательство: Apress
Год: 2004
ISBN: 9781590593790
Формат: pdf
Страниц: 167
Размер: 28,7 mb
Язык: English

Black Hat: Misfits, Criminals, and Scammers in the Internet Age is a book about hackers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
SSH Mastery: Openssh, Putty, Tunnels and Keys, 2nd Edition
/ Комментариев: 0/


Название: SSH Mastery: Openssh, Putty, Tunnels and Keys, 2nd Edition
Автор: Michael W Lucas
Издательство: Tilted Windmill Press
Год: 2018
Страниц: 242
Формат: EPUB
Размер: 10 Mb
Язык: English

Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing. Lose the confusion. SSH Mastery rescues you from sifting through decades of obsolete online tutorials and quickly makes you an SSH journeyman.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
/ Комментариев: 0/


Название: Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
Автор: Michalis Polychronakis, Michael Meier
Издательство: Springer
Год: 2017
ISBN: 9783319608754
Серия: Lecture Notes in Computer Science (Book 10327)
Формат: pdf
Страниц: 412
Размер: 27,8 mb
Язык: English

This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
5G Physical Layer: Principles, Models and Technology Components
/ Комментариев: 0/


Название: 5G Physical Layer: Principles, Models and Technology Components
Автор: Ali Zaidi, Fredrik Athley, Jonas Medbo, Ulf Gustavsson, Giuseppe Durisi, Xiaoming Chen
Издательство: Elsevier Ltd.
Год: 2018
Формат: PDF
Страниц: 314
Размер: 28,61 МБ
Язык: English

5G Physical Layer: Principles, Models and Technology Components explains fundamental physical layer design principles, models and components for the 5G new radio access technology - 5G New Radio (NR). The physical layer models include radio wave propagation and hardware impairments for the full range of frequencies considered for the 5G NR (up to 100 GHz). The physical layer technologies include flexible multi-carrier waveforms, advanced multi-antenna solutions, and channel coding schemes for a wide range of services, deployments, and frequencies envisioned for 5G and beyond.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Absolute Beginner's Guide to Wi-Fi Wireless Networking
/ Комментариев: 0/


Автор: Harold Davis
Название: Absolute Beginner's Guide to Wi-Fi Wireless Networking
Издательство: Que Publishing
Год: 2004
ISBN: 9780789731159
Язык: English
Формат: chm
Размер: 10,5 mb
Страниц: 312

This book is exactly what the title claims - and more. Any Wi-Fi/Wireless Networking newbie will easily learn the necessary fundamentals.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ubiquitous Computing and Computing Security of IoT
/ Комментариев: 0/

Название: Ubiquitous Computing and Computing Security of IoT
Автор: N. Jeyanthi (et al.)
Издательство: Springer
Год: 2018
ISBN: 3030015653 / 9783030015657
Серия: Studies in Big Data (Book 47)
Формат: epub,pdf
Страниц: 127
Размер: 10,8 mb
Язык: English

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT.