Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Very Good. 1. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting.
Zustand: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains.
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 42,22
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling. Num Pages: 336 pages, black & white illustrations. BIC Classification: URY; UTN. Category: (P) Professional & Scholarly; (UP) Postgraduate; (UU) Undergraduate. Dimension: 234 x 190 x 19. Weight in Grams: 488. . 2002. Paperback. . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 53,96
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 336 pages. 8.75x7.25x0.75 inches. In Stock.
EUR 48,84
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also .
Taschenbuch. Zustand: Neu. Neuware - \* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective\* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS\* Features coverage of the recently revised IETF IDS specification\* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling\* Provides step-by-step instructions for configuration procedures.