![Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information](https://www.pdfsearch.io/img/dd7a26b2b32377428c421f98d4d510e5.jpg)
| Document Date: 2008-05-27 17:31:10 Open Document File Size: 229,36 KBShare Result on Facebook
Country United States / / / Facility chlin}@nmi.iii.org.tw International Computer Science Institute / Institute For Information Industry / / IndustryTerm end systems / physical network / replay technology / transformation tools / Network intrusion detection systems / scapy packet processing tool / web server / external systems / virtual target network / intrusion detection systems / / OperatingSystem Unix / / Organization tw International Computer Science Institute / Institute For Information Industry / / / Position analyst / / Technology HTTP / network protocol / checksumming algorithm / Unix / web server / replay technology / /
SocialTag |