Anbieter: BooksRun, Philadelphia, PA, USA
EUR 7,92
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Fair. 1. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way.
Verlag: Wiley & Sons, Incorporated, John, 2002
ISBN 10: 0764549499 ISBN 13: 9780764549496
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
EUR 13,79
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Used book that is in clean, average condition without any missing pages.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 40,61
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Kennys Bookstore, Olney, MD, USA
EUR 58,66
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling. Num Pages: 336 pages, black & white illustrations. BIC Classification: URY; UTN. Category: (P) Professional & Scholarly; (UP) Postgraduate; (UU) Undergraduate. Dimension: 234 x 190 x 19. Weight in Grams: 488. . 2002. Paperback. . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 54,09
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 336 pages. 8.75x7.25x0.75 inches. In Stock.
EUR 60,56
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - \* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective\* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS\* Features coverage of the recently revised IETF IDS specification\* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling\* Provides step-by-step instructions for configuration procedures.