Description: Network security development kits explain Chapter 7 Network Intrusion Detection Libnids 7.1 Libnids Development Kit 7.1.1 Libnids an overview of the use of 7.1.2 Libnids the installation of 7.2 Libnids data structure 7.2.1 basic constants 7.2.2 ttrple4 7.2.3 halLstream 7.2.4 tcp_stream 7.2.5 nids_prm 7.2.6 nids_chksum_ctl 7.3 Libnids function 7.4 Libnids the use of TCP connections 7.4.1 shows 7.4.2 shows UDP Datagram 7.4.3 HTTP protocol analysis 7.4.4 FrP protocol analysis 7.4.5 Telnet protocol analysis 7.4.6 POP3 protocol analysis 7.4.7 SMTP and ESMTP protocol analysis 7.4.8 IP packet capture and analysis 7.4.9 Detection attack an example of 7.5 Summary
- [mfc4.ZIP] - Hou Junjie's easy MFC
- [lnids] - This my graduation design. On the networ
- [5LoavesSrc] - connecting example, similar to the tunne
- [iids] - joined the ac_bm match and completed a p
- [TCP-IPillustratedvolunie3] - TCP/IP Detailed卷三reading program design
- [netsafe1111--4] - Network security development kits expla
- [netsafe1111--5] - err
- [http] - This article describes the application l
- [c] - Write computer programs, from the IP dat
- [http-sinffer] - http network packet interception and red
File list (Check if you may need any files):