يعرض 1 - 10 نتائج من 10 نتيجة بحث عن '"縱深防禦"', وقت الاستعلام: 0.35s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Dissertation/ Thesis
  4. 4
  5. 5
  6. 6
    Dissertation/ Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    المؤلفون: 黃遠芳, Yuan-Fang Huang

    المساهمون: 黃能富, Nen-Fu Huang

    Time: 48

    وصف الملف: 155 bytes; text/html

    Relation: [1]. Computer Crime Research Center, http://www.crime-research.org/ [2]. LVS (Linux Virtual Server), http://www.linuxvirtualserver.org/ [3]. Nen-Fu Huang, Chih-Hao Chen, Rong-Tai Liu, Chia-Nan Kao, “On the Design of a Cost Effective Network Security Switch Architecture,” to appear in the IEEE GLOBECOM 2005, St. Louis, Missouri, USA, November 2005. [4]. Xin Liu and Andrew A. Chien. Traffic-based Load Balance for Scalable Network Emulation. Proceedings of SC2003 (November 2003). [5]. HA (High Availability), http://www.linuxvirtualserver.org/HighAvailability/ [6]. Linux HA, http://www.linux-ha.org/ [7]. Cisco system Inc, Cisco Catalyst 6500 Series Switch, http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/ [8]. 3Com. Security Switch , http://www.3com.com/prod/cz_CZ_EMEA/prodlist.jsp?tab=cat&cat=134482&subcat=171050 [9]. Alcatel OmniSwitch 6600 , http://www.alcatel.com/products/productsummary.jhtml?repositoryID=/x/opgproduct/OS6000series.jhtml [10]. Rich Seifert, “The Switch Book :The Complete Guide to LAN Switching Technology ”, John Wiley & Sons, Inc., 2000. [11]. Douglas B. WEST, “Introduction to Graph Theory (2nd Edition)”. [12]. Alessandro Rubini & Jonathan Corbet, “Linux Device Driver, Second edition: A NUIX-COMPATIBLE OPERATING SYSTEM ”, O’REILLY. [13]. Nexcom International Co., LTD, Http://nsa.nexcom.com.tw/utf-8/index.jsp [14]. The netfilter/iptables project, http://www.netfilter.org/ [15]. Bridge - Linux Ethernet bridging, http://bridge.sourceforge.net/ [16]. Snort.org, Http://www.snort.org/ [17]. Jack Koziol, “Intrusion Detection with Snort”, SAMS, 2003 [18]. IEEE 802.1D: Media Access Control (MAC) Bridge, 1998. [19]. IEEE 802.1Q: Virtual Bridge Local Area Networks, May 2003 [20]. Cisco System Inc., “Cisco Catalyst 2950 Series Switches with Enhanced Image SW” [21]. Cisco system Inc, Cisco 2950 Switch Software Configuration Guide [22]. Kennedy Clark and Kevin Hamilton, “Cisco LAN Switching :The most complete guide to Cisco Catalyst switch network design, operation, and configuration ”, Cisco Press, 2001. [23]. Analysis Console for Intrusion Databases, http://acidlab.sourceforge.net.net/ [24]. SNORT+MYSQL+ACID, http://www.snort.org/docs/snort_acid_rh9.pdf [25]. RRDtool : logging &graphing, http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ [26]. SNMP Software, http://www.net-snmp.org/ [27]. Douglas R. Mauro & Kevin J. Schmidt, Essential SNMP : Help for System and Network Administrators, 2001 ,O’REILLY [28]. IXIA: Leader in IP Network Testing, http://www.ixiacom.com/ [29]. Michael Beck, Harald Bohme, Mirko Dziadzka, Ulrich Kunitz, Robert Magnus, Dirk Verworner, “ Linux Kernel Programming Third Edition”, Addison Wesley Professional., 2003 [30]. Jay Beale, Caswell, “Snort 2.1 Intrusion Detection Second Edition”, SYNGRESS, 2004; http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/29387