FOYDALANILGAN ADABIYOTLAR




Download 37,21 Kb.
bet8/8
Sana21.05.2024
Hajmi37,21 Kb.
#248021
1   2   3   4   5   6   7   8
Bog'liq
amaliyot hisoboti

FOYDALANILGAN ADABIYOTLAR

  1. Bejtlich, Richard. (2006). "The Tao of Network Security Monitoring: Beyond Intrusion Detection." Addison-Wesley Professional.

  2. Northcutt, Stephen, et al. (2006). "Network Intrusion Detection: An Analyst's Handbook." New Riders.

  3. Cheswick, William R., et al. (2003). "Firewalls and Internet Security: Repelling the Wily Hacker." Addison-Wesley Professional.

  4. Chapple, Mike, et al. (2015). "Information Security Illuminated." Jones & Bartlett Learning.

  5. Shimonski, Robert J. (2016). "Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework." John Wiley & Sons.

  6. Caswell, Laura, et al. (2013). "Wireshark & Ethereal Network Protocol Analyzer Toolkit." Syngress.

  7. Krawetz, Neal. (2007). "Hacking the Art of Exploitation." No Starch Press.

  8. Siles, Arturo, et al. (2012). "Nmap 6: Network Exploration and Security Auditing Cookbook." Packt Publishing.

  9. Rash, Michael, et al. (2008). "Intrusion Prevention and Active Response: Deploying Network and Host IPS." Syngress.

  10. Endace. (2005). "Wireshark and Ethereal: Network Protocol Analyzer Toolkit." Syngress.


Download 37,21 Kb.
1   2   3   4   5   6   7   8




Download 37,21 Kb.