| 000 | 01803cam a2200301 a 4500 | ||
|---|---|---|---|
| 008 | 080717s2002 inua 001 0 eng | ||
| 010 | _a2001099565 | ||
| 020 | _a0735712654 | ||
| 035 | _a(Sirsi) u765 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 0 |
_a005.8 _2 22 |
| 100 | 1 |
_aNorthcutt, Stephen. _913701 |
|
| 245 | 1 | 0 |
_aNetwork intrusion detection / _c Stephen Northcutt, Judy Novak. |
| 250 | _a3rd ed. | ||
| 260 |
_aIndianapolis, Ind. : _b New Riders Pub., _c 2002, c2003. |
||
| 300 |
_axvii, 490 p. : _b ill. ; _c 23 cm. |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _ai. tcp/ip -- ii. traffic analysis. -- iii. filters/rules for network monitoring. -- iv. intrusion infrastructure -- v. appendixes -- index. | |
| 520 | _aThe Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filter | ||
| 520 | _aUS Chief Information Warfare Officer Stephen Northcutt provides information on how to protect a corporate network. Included is advice and technical content, reviewed by the top names in network security. | ||
| 630 | 0 | 0 |
_aCIT. _914 |
| 650 | 0 |
_aComputer networks _x Security measures. _913702 |
|
| 650 | 0 |
_aInternet _x Security measures. _913703 |
|
| 650 | 0 |
_aComputer security. _913704 |
|
| 700 | 1 |
_aNovak, Judy. _96586 |
|
| 596 | _a1 | ||
| 999 |
_c6620 _d6620 |
||