Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Cisco Network Professional's Advanced Internetworking Guide
Cisco Network Professional's Advanced Internetworking Guide
Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.

The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,...

Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

This book takes readers through the intricacies of the OpenBSD platform, and teaches them how to manage the system with friendly explanations, background information, troubleshooting suggestions, and copious examples.

This straightforward, practical, and complete guide to mastering the powerful and complex OpenBSD operating system,...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Snort 2.0 Intrusion Detection
Snort 2.0 Intrusion Detection
“Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that
ominous announcement emanating from a robot as it twisted and turned with arms
thrashing and head spinning, we sat galvanized to our televisions waiting for the
intruder to reveal itself.Would this be the end of Will Robinson, as we knew him?...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy