Zu dieser ISBN ist aktuell kein Angebot verfügbar.
This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
(Keine Angebote verfügbar)
Buch Finden: Kaufgesuch aufgebenSie finden Ihr gewünschtes Buch nicht? Wir suchen weiter für Sie. Sobald einer unserer Buchverkäufer das Buch bei AbeBooks anbietet, werden wir Sie informieren!
Kaufgesuch aufgeben