You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Provides information on ways to use Wireshark to capture and analyze packets, covering such topics as building customized capture and display filters, graphing traffic patterns, and building statistics and reports.
Collected volumes one and two of Chris Sanders' webcomic, "Kiskaloo," about the misadventures of a wretched one-eyed cat living in Alaska.
The foundational guide for using deception against computer network adversaries.When an attacker breaks into your network, you have a home-field advantage. But how do you use it?Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring honeypots -- security resources whose value lies in being probed and attacked. These fake systems, services, and tokens lure attackers in, enticing them to interact. Unbeknownst to the attacker, those interactions generate logs that alert you to their presence and educate you about their tradecraft. Intrusion Detection Honeypots teaches you how to: Use the See-Think-Do framework to integrate honeypots into your network and ...
Provides information on ways to use Wireshark to capture and analyze packets, covering such topics as building customized capture and display filters, graphing traffic patterns, and building statistics and reports.
A young girl choses a star from the sky to be her new baby sibling.
Volume 1, issue 2
"Be taken on a journey around the neighbourhood to discover the teddies in their hiding places. Plus, have some counting fun at the same too. The song has been recorded with the Auckland Philharmonic Orchestra and will get everyone singing and dancing to the catch tune. Colourful illustrations accompany the story. The song can be downloaded with a QR code."--aotearoabooks.co.nz.
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you ...
Meet artist, animator, and film maker Eliza Ivanova, and her powerful figures that blend traditional painting with evocative movement.
Tells children how to call an ambulance in an emergency - by dialling 111.