The Tao of Network Security Monitoring : Beyond Intrusion Detection
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
Addison-Wesley
2005
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
uiilib-520BKE003183 |
---|---|
record_format |
oai_dc |
spelling |
uiilib-520BKE0031832016-08-08 00:00:00Direktorat Perpustakaan Universitas Islam IndonesiaThe Tao of Network Security Monitoring : Beyond Intrusion DetectionBEJTLICH, RichardAddison-Wesley2005TEXT005.8 / Ric / a |
institution |
Universitas Islam Indonesia |
collection |
Perpustakaan Universitas Islam Indonesia |
description |
|
format |
TEXT |
author |
BEJTLICH, Richard |
spellingShingle |
BEJTLICH, Richard The Tao of Network Security Monitoring : Beyond Intrusion Detection |
author_facet |
BEJTLICH, Richard |
author_sort |
BEJTLICH, Richard |
title |
The Tao of Network Security Monitoring : Beyond Intrusion Detection |
title_short |
The Tao of Network Security Monitoring : Beyond Intrusion Detection |
title_full |
The Tao of Network Security Monitoring : Beyond Intrusion Detection |
title_fullStr |
The Tao of Network Security Monitoring : Beyond Intrusion Detection |
title_full_unstemmed |
The Tao of Network Security Monitoring : Beyond Intrusion Detection |
title_sort |
tao of network security monitoring : beyond intrusion detection |
publisher |
Addison-Wesley |
publishDate |
2005 |
callnumber-raw |
005.8 / Ric / a |
callnumber-search |
005.8 / Ric / a |
_version_ |
1747213006595424256 |