×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [packet dumps]
Enhancing Computer Security via End-to-End Communication Visualization
1.348 views
Tuning and Evaluating TCP End-to-End Performance in LFN Networks P. Cimbál*
[email protected]
Measurement was supported by Sven Ubik**
[email protected]
213 views
DefCon 2012 - Hacking MS Exchange Mobile Client
1.516 views
Martin Roesch Sourcefire Inc.. Topics Background –What is Snort? Using Snort Snort Architecture
281 views
Modified slides from Martin Roesch Sourcefire Inc
231 views
Copyright 2001 Martin Roesch, All Rights Reserved Martin Roesch Sourcefire Inc
218 views
Global Intrusion Detection Using Distribute Hash Table Jason Skicewicz, Laurence Berland, Yan Chen Northwestern University 6/2004
218 views
Global Intrusion Detection Using Distribute Hash Table
25 views
You Are Here
21 views