Configuración de una herramienta open source para la detección de intrusos en redes wifi caso de estudio: Suricata IDS.
IDS systems surge as telecommunication technology advances as do attacks on different networks, given that information has become a substantial asset in organizations and businesses, anyone connected to the Internet network is exposed to having their data collected for malicious purposes without an...
Furkejuvvon:
| Váldodahkki: | |
|---|---|
| Materiálatiipa: | bachelorThesis |
| Giella: | spa |
| Almmustuhtton: |
2019
|
| Fáttát: | |
| Liŋkkat: | http://dspace.unl.edu.ec/jspui/handle/123456789/22835 |
| Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|