MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Hi-index | 0.00 |
From the Publisher:The best possible defense to a network security breach is an offensive strategy that allows regular testing of a network to reveal the vulnerabilities before a hack learns of them. This innovative book offers step-by-step guidance so that an IT professional may test his/her own network security with customized software. John Chirillo provides readers with detailed information on how to build and operate a reliable security analysis/monitoring system.