|
FOYDALANILGAN ADABIYOTLAR
|
bet | 8/8 | Sana | 21.05.2024 | Hajmi | 37,21 Kb. | | #248021 |
Bog'liq amaliyot hisobotiFOYDALANILGAN ADABIYOTLAR
Bejtlich, Richard. (2006). "The Tao of Network Security Monitoring: Beyond Intrusion Detection." Addison-Wesley Professional.
Northcutt, Stephen, et al. (2006). "Network Intrusion Detection: An Analyst's Handbook." New Riders.
Cheswick, William R., et al. (2003). "Firewalls and Internet Security: Repelling the Wily Hacker." Addison-Wesley Professional.
Chapple, Mike, et al. (2015). "Information Security Illuminated." Jones & Bartlett Learning.
Shimonski, Robert J. (2016). "Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework." John Wiley & Sons.
Caswell, Laura, et al. (2013). "Wireshark & Ethereal Network Protocol Analyzer Toolkit." Syngress.
Krawetz, Neal. (2007). "Hacking the Art of Exploitation." No Starch Press.
Siles, Arturo, et al. (2012). "Nmap 6: Network Exploration and Security Auditing Cookbook." Packt Publishing.
Rash, Michael, et al. (2008). "Intrusion Prevention and Active Response: Deploying Network and Host IPS." Syngress.
Endace. (2005). "Wireshark and Ethereal: Network Protocol Analyzer Toolkit." Syngress.
|
| |