Network Intrusion Detection, Third Edition:
The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical informat...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Sams
2002
|
Ausgabe: | 3rd edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0735712654/?ar |
Zusammenfassung: | The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. |
Umfang: | 1 online resource (512 pages) |
ISBN: | 0735712654 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047348763 | ||
003 | DE-627-1 | ||
005 | 20240228120726.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2002 xx |||||o 00| ||eng c | ||
020 | |a 0735712654 |9 0-7357-1265-4 | ||
035 | |a (DE-627-1)047348763 | ||
035 | |a (DE-599)KEP047348763 | ||
035 | |a (ORHE)0735712654 | ||
035 | |a (DE-627-1)047348763 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Northcutt, Stephen |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network Intrusion Detection, Third Edition |c Northcutt, Stephen |
250 | |a 3rd edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Sams |c 2002 | |
300 | |a 1 online resource (512 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. | ||
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet ; Security measures | |
700 | 1 | |a Novak, Judy |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0735712654/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047348763 |
---|---|
_version_ | 1833357122639757313 |
adam_text | |
any_adam_object | |
author | Northcutt, Stephen Novak, Judy |
author_facet | Northcutt, Stephen Novak, Judy |
author_role | aut aut |
author_sort | Northcutt, Stephen |
author_variant | s n sn j n jn |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047348763 (DE-599)KEP047348763 (ORHE)0735712654 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3rd edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02140cam a22004692c 4500</leader><controlfield tag="001">ZDB-30-ORH-047348763</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120726.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2002 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0735712654</subfield><subfield code="9">0-7357-1265-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348763</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047348763</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0735712654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348763</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Northcutt, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Intrusion Detection, Third Edition</subfield><subfield code="c">Northcutt, Stephen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Sams</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (512 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Novak, Judy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0735712654/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047348763 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:46:40Z |
institution | BVB |
isbn | 0735712654 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (512 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Sams |
record_format | marc |
spelling | Northcutt, Stephen VerfasserIn aut Network Intrusion Detection, Third Edition Northcutt, Stephen 3rd edition. [Erscheinungsort nicht ermittelbar] Sams 2002 1 online resource (512 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters. Internet Security measures Computer security Computer networks Security measures Computer Security Internet ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Novak, Judy VerfasserIn aut |
spellingShingle | Northcutt, Stephen Novak, Judy Network Intrusion Detection, Third Edition Internet Security measures Computer security Computer networks Security measures Computer Security Internet ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
title | Network Intrusion Detection, Third Edition |
title_auth | Network Intrusion Detection, Third Edition |
title_exact_search | Network Intrusion Detection, Third Edition |
title_full | Network Intrusion Detection, Third Edition Northcutt, Stephen |
title_fullStr | Network Intrusion Detection, Third Edition Northcutt, Stephen |
title_full_unstemmed | Network Intrusion Detection, Third Edition Northcutt, Stephen |
title_short | Network Intrusion Detection, Third Edition |
title_sort | network intrusion detection third edition |
topic | Internet Security measures Computer security Computer networks Security measures Computer Security Internet ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
topic_facet | Internet Security measures Computer security Computer networks Security measures Computer Security Internet ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
work_keys_str_mv | AT northcuttstephen networkintrusiondetectionthirdedition AT novakjudy networkintrusiondetectionthirdedition |