-
1
-
-
34547311633
-
-
Available on the Internet
-
T. Bradley, Intrusion Detection System, 2006, Available on the Internet: http://netsecurity.about.com/cs/hackertools/a/aa030504.htm
-
(2006)
Intrusion Detection System
-
-
Bradley, T.1
-
2
-
-
4544265969
-
Snort 2.0 Intrusion Detection
-
ISBN 1-931-83674-4
-
B. Caswell, Snort 2.0 Intrusion Detection, Syngress, 2003, p. 523, ISBN 1-931-83674-4
-
(2003)
Syngress
, pp. 523
-
-
Caswell, B.1
-
3
-
-
34547299276
-
-
A. Gupta and S. Laliberte, Defend, I. T.: Security by Example, Addison Wesley Professional, 2004, p. 384, SBN 0-321-19767-4
-
A. Gupta and S. Laliberte, Defend, I. T.: Security by Example, Addison Wesley Professional, 2004, p. 384, SBN 0-321-19767-4
-
-
-
-
6
-
-
34547318385
-
-
January, Available on the Internet
-
Intrusion Prevention System, Wikipedia, January 2006, Available on the Internet: http://en.wikipedia.org/wiki/Intrusionprevention_system
-
(2006)
Intrusion Prevention System, Wikipedia
-
-
-
8
-
-
33645402669
-
-
Prentice Hall, ISBN 0-13-140733-3
-
R. U. Rehman, Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Prentice Hall, 2003, p. 288, ISBN 0-13-140733-3
-
(2003)
Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
, pp. 288
-
-
Rehman, R.U.1
-
9
-
-
34547343133
-
-
Understating Intrusion Detection System, Sans Institute, 2001, 7p., Available on the Internet: http://www.sans.org/rr/whitepapers/detection/337.php
-
Understating Intrusion Detection System, Sans Institute, 2001, 7p., Available on the Internet: http://www.sans.org/rr/whitepapers/detection/337.php
-
-
-
-
10
-
-
33845483575
-
-
Budapest, p, ISBN 9639548 09X
-
L. Vokorokos, Digital Computers Principles, Typotex 2004, Budapest, p. 232, ISBN 9639548 09X
-
(2004)
Digital Computers Principles, Typotex
, pp. 232
-
-
Vokorokos, L.1
-
11
-
-
34547331728
-
-
L. Vokorokos L., O. Látka, M. Chovanec, A. Kleinová, Secure Connection of Database Systems to the Applications made by a Standard MVC, in Proceedings of the 4th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence, Herl'any Slovakia, January 21-22, Budapest, Budapest Tech, Hungary, 2006, pp. 311-318, ISBN 963 7154 44 2
-
L. Vokorokos L., O. Látka, M. Chovanec, A. Kleinová, "Secure Connection of Database Systems to the Applications made by a Standard MVC, " in Proceedings of the 4th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence, Herl'any Slovakia, January 21-22, Budapest, Budapest Tech, Hungary, 2006, pp. 311-318, ISBN 963 7154 44 2
-
-
-
-
12
-
-
34547372008
-
-
E. Yakabovicz, IDS and IPS, TechTarget, 2006, Available on the Internet: http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci936192,00.htm l
-
E. Yakabovicz, IDS and IPS, TechTarget, 2006, Available on the Internet: http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci936192,00.html
-
-
-
|