1. Extrusion detection : security monitoring for internal intrusions
Author: Bejtlich, Richard
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Electronic countermeasures
Classification :
TK
5105
.
59
.
B45E96


2. Extrusion detection: security monitoring for internal intrusions
Author: Bejtlich, Richard
Library: Central Library of APLL (Tehran)
Subject: ، Computer networks - Security measures,، Electronic countermeasures
Classification :
TK
5105
.
59
.
B4
2006


3. Intrusion detection and correlatio
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer security,Electronic countermeasures
Classification :
TK5105
.
59
.
K78
2005


4. Intrusion detection and correlation
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer security,Electronic countermeasures
Classification :
E-BOOK

5. Intrusion detection and correlation
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security.,Electronic countermeasures.
Classification :
TK
,
5105
.
59
,.
K78
,
2005


6. Intrusion detection and correlation :
Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)
Classification :
TK5105
.
59
.
K78
2005eb


7. Intrusion detection and correlation. challenges and solutions
Author: Kruegel, Christopher
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks -- Security measures,، Computer security,، Electronic countermeasures
Classification :
TK
5105
.
59
.
K78
2005


8. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013

