
Intrusion signatures and analysis
Subjects
Computer networksSecurity measuresComputer securityData security & data encryptionSecurity - GeneralComputer Data SecurityComputersComputers - Computer SecurityNetworking - GeneralComputer Books: GeneralInternet - SecurityComputers / Internet / SecurityAccess controlComputers, access control