This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
"Sinopsis" puede pertenecer a otra edición de este libro.
This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
"Sobre este título" puede pertenecer a otra edición de este libro.
(Ningún ejemplar disponible)
Buscar: Crear una petición¿No encuentra el libro que está buscando? Seguiremos buscando por usted. Si alguno de nuestros vendedores lo incluye en IberLibro, le avisaremos.
Crear una petición