메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-442

Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network

(1)  Gregg, Michael a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85133474611     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-1-59749-109-9.X5000-X     Document Type: Book
Times cited : (9)

References (2)
  • 2
    • 34748877099 scopus 로고    scopus 로고
    • April 22-27, 2006 Montreal, Quebec, Canada. Copyright 2006 ACM 1-59593-178-3/06/0004, CHI, USA
    • Dhamija R., Hearst M., Tygar J.D. Why Phishing Works 2006, April 22-27, 2006 Montreal, Quebec, Canada. Copyright 2006 ACM 1-59593-178-3/06/0004, CHI, USA.
    • (2006) Why Phishing Works
    • Dhamija, R.1    Hearst, M.2    Tygar, J.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.