版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
As a follow-up title to the "Introduction to Network Analysis," this book provides sound step-by-step instructions on packet decoding, basic through advanced filtering and switched LAN analysis. Learn to build filters to capture hackers coming through your firewall, decode 'unknown' protocols, and set up a trigger that launches your analyzer in the middle of the night.
http://rapidshare.com/files/4484331/NI1893939286.rar
As a follow-up title to the "Introduction to Network Analysis," this book provides sound step-by-step instructions on packet decoding, basic through advanced filtering and switched LAN analysis. Learn to build filters to capture hackers coming through your firewall, decode 'unknown' protocols, and set up a trigger that launches your analyzer in the middle of the night.
http://rapidshare.com/files/4484331/NI1893939286.rar