Search Results for - Narrowed by: Computer networks -- Security measures. - Watkins, Stephen.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Watkins$00252C$002bStephen.$002509Watkins$00252C$002bStephen.$0026ps$003d300?2024-06-06T20:49:57ZHack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:3399852024-06-06T20:49:57Z2024-06-06T20:49:57Zby Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:642272024-06-06T20:49:57Z2024-06-06T20:49:57Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:656622024-06-06T20:49:57Z2024-06-06T20:49:57Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>