• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹ پاسخ غیر تکراری از ۹ پاسخ تکراری در مدت زمان ۰,۵۵ ثانیه یافت شد.

1. Extrusion detection : security monitoring for internal intrusions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Richard Bejtlich

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Electronic countermeasures

Classification :
TK
5105
.
59
.
B45E96

2. Extrusion detection: security monitoring for internal intrusions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bejtlich, Richard

Library: Central Library of APLL (Tehran)

Subject: ، Computer networks - Security measures,، Electronic countermeasures

Classification :
TK
5105
.
59
.
B4
2006

3. Intrusion detection and correlatio

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computer security,Electronic countermeasures

Classification :
TK5105
.
59
.
K78
2005

4. Intrusion detection and correlation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computer security,Electronic countermeasures

Classification :
E-BOOK

5. Intrusion detection and correlation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)

Classification :
TK5105
.
59
.
K78
2005eb

6. Intrusion detection and correlation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna., Kruegel, Christopher, 1976-

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer networks--Security measures., Computer security., Electronic countermeasures.

Classification :
TK
5105
.
59
.
K78
2005

7. Intrusion detection and correlation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer security.,Electronic countermeasures.

Classification :
TK
,
5105
.
59
,.
K78
,
2005

8. Intrusion detection and correlation. challenges and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kruegel, Christopher

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer networks -- Security measures,، Computer security,، Electronic countermeasures

Classification :
TK
5105
.
59
.
K78
2005

9. The Practice of Network Security Monitoring :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Richard Bejtlich.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Electronic countermeasures.

Classification :
TK
5105
.
59
.
B436
2013
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival