Your search returned 6 results.

Sort
Results
1.
The Tao of network security monitoring : beyond intrusion detection Richard Bejtlich by
Publication details: Boston, MA Addison-Wesley c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEJ.

2.
Extrusion detection : security monitoring for internal intrusions Richard Bejtlich by
Publication details: Boston, MA Addison Wesley c2006
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 BEJ, ...

3.
Real digital forensics : computer security and incident response Keith J. Jones, Richard Bejtlich, Curtis W. Rose by
Publication details: Boston, MA Addison Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JON.

4.
Real digital forensics : computer security and incident response Keith J.Jones, Richard Bejtlich, and Curtis.W.Rose by
Publication details: Boston, MA Addison - Wesley 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 003.5 JON.

5.
6.
Pages

Find us on the map

Powered by Koha