The Tao of network security monitoring beyond intrusion detection Richard Bejtlich
Material type: TextPublication details: Boston Addison-Wesley 2005Description: xxxiv, 798 pISBN:- 0321246772
- TK5105.59 .B45 2005 c. 1
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
General Collection | Kabarak, Main Campus | TK5105.59 .B45 2005 c. 1 (Browse shelf(Opens below)) | c. 1 | Available | 028124 | ||
General Collection | Kabarak, Main Campus | TK5105.59 .B45 2005 c. 2 (Browse shelf(Opens below)) | c. 2 | Available | 028125 | ||
General Collection | Kabarak, Main Campus | TK5105.59 .B45 2005 c. 3 (Browse shelf(Opens below)) | c. 3 | Available | 028126 |
Browsing Kabarak, Main Campus shelves Close shelf browser (Hides shelf browser)
TK5105.5865 .T85 2002 c.1 WAP 2.0 development / | TK5105.59 .B45 2005 c. 1 The Tao of network security monitoring | TK5105.59 .B45 2005 c. 2 The Tao of network security monitoring | TK5105.59 .B45 2005 c. 3 The Tao of network security monitoring | TK5105.59 .B45 2013 c.1 The Practice of Network security Monitoring | TK5105.59 .B45 2013 c.2 The Practice of Network security Monitoring | TK5105.59 .B73 2004 c. 1 Network security : |
There are no comments on this title.
Log in to your account to post a comment.