Intrusion prevention systems: How do they prevent intrusion?
暂无分享,去创建一个
[1] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[2] Liu Xiang. Network-based intrusion prevention system , 2005 .
[3] Ray Hunt,et al. Reactive firewalls - a new technique , 2003, Comput. Commun..
[4] Filip Schepers,et al. Network-versus host-based intrusion detection , 1998, Inf. Secur. Tech. Rep..
[5] Helen Meyer. A history of firewall technology , 1997 .
[6] M. Conway. Hackers as terrorists? why it doesn't compute , 2003 .
[7] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[8] John Austen. Can the laws really cut down hacking? , 1997, Inf. Secur. Tech. Rep..
[9] John McHugh,et al. The Role of Intrusion Detection Systems , 2000 .
[10] Dinesh Sequeira. INTRUSION PREVENTION SYSTEMS - SECURITY'S SILVER BULLET? , 2002 .
[11] Sandeep Kumar Gupta,et al. Buffer overflow attacks & countermeasures , 2007 .
[12] Matt Mathis. Fragmentation Considered Very Harmful , 2004 .
[13] Bill Hancock. Hackers attack US Government web sites in protest of Chinese embassy bombing , 1999 .
[14] Duncan Napier. IPTables/NetFilter-Linux''s next-generation stateful packet filter , 2001 .
[15] Rossouw von Solms,et al. The 10 deadly sins of information security management , 2004, Comput. Secur..
[16] Bill Hancock,et al. Security view: A unique Canadian approach - Invite the hacker to nail your networks , 1999 .
[17] Benjamin A. Kuperman,et al. A Building Block Approach to Intrusion Detection , 2001 .
[18] Helen Meyer,et al. Is network intrusion detection software being used correctly , 1998 .
[19] Bill Hancock. NASA Hacker Pleads Guilty , 2000, Comput. Secur..
[20] Morgan O apos,et al. Cyber-extortion evolves , 2004 .
[21] Ray Hunt,et al. Security architecture testing using IDS - a case study , 2002, Comput. Commun..
[22] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[23] Jeffrey C. Mogul,et al. Simple and Flexible Datagram Access Controls for UNIX-based Gateways , 1999 .
[24] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[25] Jon David,et al. Policy enforcement in the workplace , 2002, Comput. Secur..
[26] Steven Furnell,et al. Computer hacking and cyber terrorism: the real threats in the new millennium? , 1999, Comput. Secur..
[27] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..