1. Managing security with Snort and IDS tools
Author: / Kerry Cox and Christopher Gerg
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures
Classification :
E-BOOK
2. Managing security with Snort and IDS tools
Author: / Kerry Cox and Christopher Gerg
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures
Classification :
TK5105
.
59
.
C65
2004
3. Snor
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.
Classification :
TK
,
5105
.
59
,.
B42
,
2007
4. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK5105
.
59
.
B42
2007
5. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
E-BOOK
6. Snort 2.1 Intrusion Detection
Author: Featuring the Snort Development Team Andrew R. Baker, Brian Caswell, Mike Poor
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK
,
5105
.
59
,.
B42S7
,
2004