FOYDALANILGAN ADABIYOTLAR
1. Bejtlich, Richard. (2006). "The Tao of Network Security Monitoring:
Beyond Intrusion Detection." Addison-Wesley Professional.
2. Northcutt, Stephen, et al. (2006). "Network Intrusion Detection: An
Analyst's Handbook." New Riders.
3. Cheswick, William R., et al. (2003). "Firewalls and Internet Security:
Repelling the Wily Hacker." Addison-Wesley Professional.
4. Chapple, Mike, et al. (2015). "Information Security Illuminated." Jones &
Bartlett Learning.
5. Shimonski, Robert J. (2016). "Wireshark for Security Professionals: Using
Wireshark and the Metasploit Framework." John Wiley & Sons.
6. Caswell, Laura, et al. (2013). "Wireshark & Ethereal Network
Protocol
Analyzer Toolkit." Syngress.
43
7. Krawetz, Neal. (2007). "Hacking the Art of Exploitation." No Starch Press.
8. Siles, Arturo, et al. (2012). "Nmap 6: Network
Exploration and Security
Auditing Cookbook." Packt Publishing.
9. Rash, Michael, et al. (2008). "Intrusion Prevention and Active Response:
Deploying Network and Host IPS." Syngress.
10.
Endace. (2005). "Wireshark and Ethereal: Network
Protocol Analyzer
Toolkit." Syngress.
44