Fabian, 2004 - Google Patents
Global Information Assurance Certified Intrusion Analyst Practical (GCIA)Fabian, 2004
View PDF- Document ID
- 9446742829262149935
- Author
- Fabian B
- Publication year
External Links
Snippet
This work is a practical to fulfill the requirements of certification as a SANS Institute's GIAC Certified Intrusion Analyst (GCIA), Assignment version 3.5 (see www. sans. org and www. giac. orc). It consists of three main parts: Design an Enterprise Intrusion Detection …
- 238000004458 analytical method 0 abstract description 20
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nawrocki et al. | A survey on honeypot software and data analysis | |
| Durumeric et al. | {ZMap}: Fast internet-wide scanning and its security applications | |
| Ndatinya et al. | Network forensics analysis using Wireshark | |
| US8065725B2 (en) | Systems and methods for enhanced network security | |
| Mohammed et al. | Honeypots and Routers: Collecting internet attacks | |
| Zang et al. | Botnet detection through fine flow classification | |
| Binnie | Linux Server security: hack and defend | |
| Norton | An ettercap primer | |
| Rødfoss | Comparison of open source network intrusion detection systems | |
| Goebel | Advanced Honeynet based Intrusion Detection | |
| Fabian | Global Information Assurance Certified Intrusion Analyst Practical (GCIA) | |
| Fabian | GIAC Certified Intrusion Analyst (GCIA) | |
| Kock | A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules | |
| Monteiro | How intrusion detection can improve software decoy applications | |
| WO2003103214A1 (en) | Systems and methods for enhanced network security | |
| Gehrke | The unexplored impact of ipv6 on intrusion detection systems | |
| Biswas et al. | Network Forensics Analysis | |
| Ye | Resilience to DDoS attacks | |
| Whyte | Network scanning detection strategies for enterprise networks | |
| Triulzi | Intrusion Detection Systems and IPv6 | |
| Sarvepalli | Designing Network Security Labs | |
| Gurusamy | DIPLOMA THESIS ASSIGNMENT | |
| Thangavel et al. | Sniffers Over Cloud Environment: A Literature Survey | |
| Hunter | A framework for Malicious Host Fingerprinting Using Distributed Network Sensors | |
| Peddisetty | State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation. |