Search alternatives:
snorks » storks, snores, snorkels
snorts » snort, snores

1
by Beale, Jay
Published 2007
Syngress
Table of Contents: ...Ch. 1. Intrusion detection systems -- Ch. 2. Introducing snort 2.6 -- Ch. 3. Installing snort 2.6...

2
by Orebaugh, Angela
Published 2005
O'Reilly Media
... before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source...

3
by Koziol, Jack
Published 2003
Sams
Table of Contents: ...Intrusion detection primer -- Network intrusion detection with Snort -- Dissecting Snort...

4
by Cox, Kerry
Published 2004
O'Reilly
Subjects: ...Snort (Computer file)...

5
by Beale, Jay
Published 2004
Syngress
Table of Contents: ...Ch. 1. Intrusion detection systems -- Ch. 2. Introducing Snort 2.1 -- Ch. 3. Installing Snort -- Ch...

6
by Russell, Ryan
Published 2003
Syngress Pub.
Table of Contents: ...Cover; Contents; Intrusion Detection Systems; Introducing Snort 2.0; Installing Snort; Snort...

7
by Archibald, Neil
Published 2005
Syngress
Table of Contents: .... Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort...

8
by Seagren, Eric
Published 2006
Syngress

9
by Gregg, Michael
Published 2006
Syngress Pub.
Table of Contents: ...Building Snort filters to capture malicious traffic Summary 7 Layer 6 Presentation layer (40 pp...

10
Published 2022
Springer International Publishing
Table of Contents: ... on Rectangular Boards – Part 1: Partisan Col and Snort -- Solving Bicoloring-Graph Games on Rectangular Boards...

11
by Babbin, Jacob
Published 2006
Syngress
Table of Contents: ... -- Managing Snort alerts with Microsoft Log Parser...

12
by O'Leary, Mike
Published 2019
Apress
Table of Contents: .... Snort -- Chapter 20. PHP -- Chapter 21. Web Applications...

13
by Rash, Michael
Published 2007
No Starch Press
Table of Contents: .... Translating Snort Rules into iptables Rules -- Ch. 10. Deploying fwsnort -- Ch. 11. Combining psad and fwsnort...

14
by Lillard, Terrence
Published 2010
Syngress
Table of Contents: ... WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based...

15
Published 2022
Springer Nature Singapore
Table of Contents: ... Using snort -- ANFIS for Fraud Automobile Insurance Detection System -- Computer Vision-Based Alert...

16
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... to Evaluate Snort and Bro Scan Detection on a Network Telescope...

17
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ... -- Snort as an IPS -- How? -- Lab 1-installing Snort and creating ICMP rules lab -- Lab 2-create...

18
Published 2023
Springer Nature Singapore
Table of Contents: ... CONTROLLER USING SNORT -- Classification of Keratoconus using Corneal Topography Pattern with Transfer...

19
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts -- Network...

20
Published 2022
Springer International Publishing
Table of Contents: ... of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research...