Search Results for - Narrowed by: Watkins, Stephen. - Online - 2006 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Watkins$00252C$002bStephen.$002509Watkins$00252C$002bStephen.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINE$002509Online$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ps$003d300? 2024-09-22T14:59:18Z Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:339985 2024-09-22T14:59:18Z 2024-09-22T14:59:18Z by&#160;Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:64227 2024-09-22T14:59:18Z 2024-09-22T14:59:18Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>