Search Results for - Narrowed by: Computer networks -- Security measures. - Gregg, Michael (Michael C.) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Gregg$00252C$002bMichael$002b$002528Michael$002bC.$002529$002509Gregg$00252C$002bMichael$002b$002528Michael$002bC.$002529$0026ps$003d300? 2024-06-13T21:36:28Z Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:2283562 2024-06-13T21:36:28Z 2024-06-13T21:36:28Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://www.sciencedirect.com/science/book/9781597491099">https://www.sciencedirect.com/science/book/9781597491099</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491099/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491099/?ar">https://learning.oreilly.com/library/view/~/9781597491099/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491099">https://learning.oreilly.com/library/view/~/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:64227 2024-06-13T21:36:28Z 2024-06-13T21:36:28Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:339985 2024-06-13T21:36:28Z 2024-06-13T21:36:28Z by&#160;Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format:&#160;Electronic Resources<br/> Inside network security assessment : guarding your IT infrastructure ent://SD_ILS/0/SD_ILS:2282083 2024-06-13T21:36:28Z 2024-06-13T21:36:28Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format:&#160;Electronic Resources<br/>