This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Request It
Save to My Lists
Export
Return to Browse
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Previous Record
Next Record
  Permalink    
Title
Intrusion signatures and analysis / Stephen Northcutt ... [and others]
Edition
First edition
Published
Indianapolis, Ind. : New Riders, 2001
Copies
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Nor/Isa
AVAILABLE
Description
xxi, 408 pages : illustrations ; 23 cm
Contents
1. Reading Log Files -- 2. Introduction to the Practicals -- 3. The Most Critical Internet Security Threats (Part 1) -- 4. The Most Critical Internet Security Threats (Part 2) -- 5. Non-Malicious Traffic -- 6. Perimeter Logs -- 7. Reactions and Responses -- 8. Network Mapping -- 9. Scans That Probe Systems for Information -- 10. Denial of Service - Resource Starvation -- 11. Denial of Service - Bandwidth Consumption -- 12. Trojans -- 13. Exploits -- 14. Buffer Overflows with Content -- 15. Fragmentation -- 16. False Positives -- 17. Out-of-Spec Packets
Bibliography
Includes bibliographical references and index
Subject
Computer security.
Computers -- Access control.
Author
Northcutt, Stephen.
LC no.
00108786
ISBN
0735710635
  Permalink