Network intrusion detection

This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in de...

Full description

Saved in:
Bibliographic Details
Main Author: Northcutt, Stephen (Author)
Other Authors: Novak, Judy
Format: Book
Language:English
Published: Indianapolis, Ind. New Riders Pub. 2003
Edition:3rd ed
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000#i 4501
001 wils-311494
005 2020925163815
008 t2003 INU a #00 eng D
020 # # |a 0735712654 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .N475 2003 
100 1 # |a Northcutt, Stephen  |e author 
245 1 1 |a Network intrusion detection  |c Stephen Northcutt, Judy Novak 
250 # # |a 3rd ed 
264 # 1 |a Indianapolis, Ind.  |b New Riders Pub.  |c 2003 
264 # 4 |c ©2003 
300 # # |a xvii, 490 pages  |b illustration  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
520 # # |a This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. 
650 # 0 |a Internet  |x Security measures 
650 # 0 |a Computer security 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Novak, Judy 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=311494 
964 # # |c BOK  |d 01 
998 # # |a 00250##a002.5.2||00250##b002.5.3||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||