Zu dieser ISBN ist aktuell kein Angebot verfügbar.
This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This version is SPIRAL BOUND so the book will lay flat in a classroom setting. This book will take you through TCP/IP, IPv4, IPv6, building firewalls, Building a Snort IDS sensor and effective logging and managing the log files. Each subject is treated as step by step guide to how to install from scratch the applications and how to make them work. We also will cover the why they are needed, but not in so much detail to make you forget why you bought the book in the first place. All the files used in the book are available at http://www.packetattack.com/private_files/iso_images/Network_Security/ in either a zipped file or by directory
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
(Keine Angebote verfügbar)
Buch Finden: Kaufgesuch aufgebenSie kennen Autor und Titel des Buches und finden es trotzdem nicht auf ZVAB? Dann geben Sie einen Suchauftrag auf und wir informieren Sie automatisch, sobald das Buch verfügbar ist!
Kaufgesuch aufgeben