-
2
-
-
0031673674
-
Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare
-
Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
-
Boulanger, A., 1998. Catapults and Grappling Hooks:The Tools and Techniques of Information Warfare. IBM Systems Journal, 37 (1):106–114. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
-
(1998)
IBM Systems Journal
, vol.37
, Issue.1
, pp. 106-114
-
-
Boulanger, A.1
-
3
-
-
85023863401
-
-
May, May, Retrieved March 20, 2001, from the World Wide Web
-
National Institute of Standards and Technology (NIST). May 1999. ITL Bulletin — Computer Attacks:What They Are and How to Defend Against Them May, Retrieved March 20, 2001, from the World Wide Web:http://www.nist.gov/itl/lab/bulletns/may99.htm
-
(1999)
ITL Bulletin — Computer Attacks: What They Are and How to Defend Against Them
-
-
-
4
-
-
85023819838
-
Cracker Tracking: Tighter Security with Intrusion Detection
-
Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
-
Hurwicz, M., 1998. Cracker Tracking:Tighter Security with Intrusion Detection. Byte, 23 (5):112–116. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
-
(1998)
Byte
, vol.23
, Issue.5
, pp. 112-116
-
-
Hurwicz, M.1
-
6
-
-
0342600000
-
-
ICSA, Inc. White Paper, Retrieved March 20, 2001, from the World Wide Web
-
Bace, R., 1999. An Introduction to Intrusion Detection and Assessment, ICSA, Inc. White Paper. Retrieved March 20, 2001, from the World Wide Web:http://www.icsa.net/html.communities/ids/White%20Paper/index.shtml
-
(1999)
An Introduction to Intrusion Detection and Assessment
-
-
Bace, R.1
-
7
-
-
85023886474
-
-
November, November, Retrieved March 20, 2001, from the World Wide Web
-
National Institute of Standards and Technology (NIST). November 1999. ITL Bulletin — Acquiring and Deploying Intrusion Detection Systems November, Retrieved March 20, 2001, from the World Wide Web:http://www.nist. gov/itl/lab/bulletns/nov99.htm
-
(1999)
ITL Bulletin — Acquiring and Deploying Intrusion Detection Systems
-
-
-
8
-
-
85023829124
-
-
Retrieved March 20, 2001, from the World Wide Web
-
Phoenix Health Systems. 2001. HIPAAdvisory — HIPAAtech:Intrusion Detection Retrieved March 20, 2001, from the World Wide Web:http://www.hipaadvisory. com/tech/IntrusionDetection.htm
-
(2001)
HIPAAdvisory — HIPAAtech: Intrusion Detection
-
-
-
9
-
-
0000010513
-
Network Based Intrusion Detection: A Review of Technologies
-
Richards, K., 1999. Network Based Intrusion Detection:A Review of Technologies. Computers & Security, 18:671–682.
-
(1999)
Computers & Security
, vol.18
, pp. 671-682
-
-
Richards, K.1
-
11
-
-
0033351533
-
Practical Security Issues with High-Speed Networks
-
Retrieved March 17, 2001, from the EBSCOhost database on the World Wide Web
-
Velissaris, J., and Santarossa, R., 1999. Practical Security Issues with High-Speed Networks. Journal of High Speed Networks, 8 (4):311–324. Retrieved March 17, 2001, from the EBSCOhost database on the World Wide Web:http://www.epnet.com
-
(1999)
Journal of High Speed Networks
, vol.8
, Issue.1
, pp. 311-324
-
-
Velissaris, J.1
Santarossa, R.2
-
12
-
-
79151472621
-
Intrusion-Detection Systems
-
Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
-
O'Leary, D., 1992. Intrusion-Detection Systems. Journal of Information Systems, 6 (1):63–74. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
-
(1992)
Journal of Information Systems
, vol.6
, Issue.1
, pp. 63-74
-
-
O'Leary, D.1
|