• Document Outline
  • FOYDALANILGAN ADABIYOTLAR




    Download 0,98 Mb.
    Pdf ko'rish
    bet16/16
    Sana15.05.2024
    Hajmi0,98 Mb.
    #235522
    1   ...   8   9   10   11   12   13   14   15   16
    Bog'liq
    hisobot1

    FOYDALANILGAN ADABIYOTLAR 
    1. Bejtlich, Richard. (2006). "The Tao of Network Security Monitoring: 
    Beyond Intrusion Detection." Addison-Wesley Professional. 
    2. Northcutt, Stephen, et al. (2006). "Network Intrusion Detection: An 
    Analyst's Handbook." New Riders. 
    3. Cheswick, William R., et al. (2003). "Firewalls and Internet Security: 
    Repelling the Wily Hacker." Addison-Wesley Professional. 
    4. Chapple, Mike, et al. (2015). "Information Security Illuminated." Jones & 
    Bartlett Learning. 
    5. Shimonski, Robert J. (2016). "Wireshark for Security Professionals: Using 
    Wireshark and the Metasploit Framework." John Wiley & Sons. 
    6. Caswell, Laura, et al. (2013). "Wireshark & Ethereal Network Protocol 
    Analyzer Toolkit." Syngress. 
    43


    7. Krawetz, Neal. (2007). "Hacking the Art of Exploitation." No Starch Press. 
    8. Siles, Arturo, et al. (2012). "Nmap 6: Network Exploration and Security 
    Auditing Cookbook." Packt Publishing. 
    9. Rash, Michael, et al. (2008). "Intrusion Prevention and Active Response: 
    Deploying Network and Host IPS." Syngress. 
    10.
    Endace. (2005). "Wireshark and Ethereal: Network Protocol Analyzer 
    Toolkit." Syngress.
    44

    Document Outline

    • 1.1. Korxonada xavfsizlik texnikasi qoidalari

    Download 0,98 Mb.
    1   ...   8   9   10   11   12   13   14   15   16




    Download 0,98 Mb.
    Pdf ko'rish