Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the first part of the article there will be described basic terms and problems concerning IDS discipline and penetration tests. The second part of the article will show the model of the testing system of the Intrusion Detection Systems
Słowa kluczowe
Rocznik
Tom
Strony
5--13
Opis fizyczny
Bibliogr. 5 poz. rys.
Twórcy
autor
- Institute of Computer Science, University of Podlasie, 3 Maja Str. 54, 08-110 Siedlce, Poland
autor
- Institute of Computer Science, University of Podlasie, 3 Maja Str. 54, 08-110 Siedlce, Poland
Bibliografia
- 1. Dhanjani N., Clarke J., Network Security Tools: Writing, Hacking and Modifying Security Tools, paperback - Apr 4, 2005,
- 2. Bauer M.D., Linux Server Security, paperback – Jan. 18, 2005,
- 3. Rash M., Linux Firewalls: Attack Detection and Response with iptables, psad and fwsnort, paperback - Sep 15, 2007,
- 4. Erickson J., Hacking: The Art of Exploitation, 2nd Edition, paperback – Jan. 11, 2008,
- 5. Lukatsky A., Protect Your Information: With Intrusion Detection, paperback - May 30, 2004.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2fca7d1f-ecd1-4227-a092-a32c6c31d2d3