The Practice of Network security Monitoring Understanding Incident detection and response Richard Bejtlich
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 1593275099
- TK5105.59 .B45 2013 c.1
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Kabarak, Main Campus | TK5105.59 .B45 2013 c.1 (Browse shelf(Opens below)) | Available | 028900 | ||
![]() |
Kabarak, Main Campus | TK5105.59 .B45 2013 c.2 (Browse shelf(Opens below)) | Available | 028901 | ||
![]() |
Kabarak, Nakuru City Campus | TK5105.59 .B45 2013 c.1 (Browse shelf(Opens below)) | Available | 028564 |
Browsing Kabarak, Main Campus shelves Close shelf browser (Hides shelf browser)
TK5105.59 .B45 2005 c. 1 The Tao of network security monitoring | TK5105.59 .B45 2005 c. 2 The Tao of network security monitoring | TK5105.59 .B45 2005 c. 3 The Tao of network security monitoring | TK5105.59 .B45 2013 c.1 The Practice of Network security Monitoring | TK5105.59 .B45 2013 c.2 The Practice of Network security Monitoring | TK5105.59 .B73 2004 c. 1 Network security : | TK5105.59 .B73 2004 c. 2 Network security : |
There are no comments on this title.
Log in to your account to post a comment.