126,08 €
140,09 €
-10% with code: EXTRA
Intrusion Prevention and Active Response
Intrusion Prevention and Active Response
126,08
140,09 €
  • We will send in 10–14 business days.
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
140.09
  • Publisher:
  • Year: 2005
  • ISBN-10: 193226647X
  • ISBN-13: 9781932266474
  • Format: 17.8 x 23.5 x 2.6 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Intrusion Prevention and Active Response (e-book) (used book) | bookbook.eu

Reviews

(2.50 Goodreads rating)

Description

Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.

EXTRA 10 % discount with code: EXTRA

126,08
140,09 €
We will send in 10–14 business days.

The promotion ends in 23d.20:31:12

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,40 Book Euros!?
  • Author: Michael Rash
  • Publisher:
  • Year: 2005
  • ISBN-10: 193226647X
  • ISBN-13: 9781932266474
  • Format: 17.8 x 23.5 x 2.6 cm, minkšti viršeliai
  • Language: English English

Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)