Related Books
Language: en
Pages: 347
Pages: 347
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'l
Language: en
Pages: 427
Pages: 427
Type: BOOK - Published: 2017-09-08 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical
Language: en
Pages: 0
Pages: 0
Type: BOOK - Published: 2017 - Publisher:
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical g
Language: en
Pages: 200
Pages: 200
Type: BOOK - Published: 2014-02-28 - Publisher: World Scientific
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that
Language: en
Pages: 496
Pages: 496
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet