Introduction to network forensics
暂无分享,去创建一个
[1] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[2] Rainer Gerhards,et al. Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog , 2010, RFC.
[3] Chris Sanders. Practical packet analysis , 2007 .
[4] Chris Fry,et al. Security monitoring - proven methods for incident detection on enterprise networks , 2009 .
[5] Ali A. Ghorbani,et al. Network Intrusion Detection and Prevention - Concepts and Techniques , 2010, Advances in Information Security.
[6] Chris Sanders,et al. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems , 2007 .
[7] Tom Killalea,et al. Guidelines for Evidence Collection and Archiving , 2002, RFC.
[8] Hervé Debar,et al. The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.
[9] David Thaler,et al. Link-local Multicast Name Resolution (LLMNR) , 2007, RFC.
[10] Stuart Cheshire,et al. Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry , 2011, RFC.
[11] Masanobu Kawashima,et al. A Recommendation for IPv6 Address Text Representation , 2010, RFC.
[12] Tatu Ylönen,et al. The Secure Shell (ssh) Transport Layer Protocol , 2006 .
[13] Fuyou Miao,et al. Transport Layer Security (TLS) Transport Mapping for Syslog , 2009, RFC.