In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
The paper evaluates some the security tools. Top security tools can be found in sectools.org/. Most important vulnerabilities in Windows and Linux can be found in ...
Network security is a hot topic these days, and intrusion detection systems are playing a greater role in network security. Refeeq Ur Rehman's book Intrusion Detection with SNORT, Apache, MySQL, PHP, ...
The book consists from three parts: Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools Part C: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results