(0)

Overview of Some Windows and Linux Intrusion Detection Tools

E-book


The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:LANguardNessusSnortBASEACIDRmanSnortCenter.OSSECSguil



  1. Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools

    Dr. Hidaia Mahmood Alassouli

    book
  2. علامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day

    Dr. Hidaia Mahmood Alassouli

    book
  3. تعقيب الكاتبة على سلسله فيديوهات الدكتورة مايا صبحي حول الخيوط الخفيه للماسونية : Author's Comments on Dr. Maya Sobhi's Series of Videos about the Hidden Secrets of Freemasonry

    Dr. Hidaia Mahmood Alassouli

    book
  4. مختارات من مقالات الكاتبه حول قضايا سياسيه وإقتصاديه وإجتماعيه ومؤسساتيه ودينيه (إصدار عام 2022) : Selections from the Author's Articles on Political, Economic, Social, Institutional and Religious Issues, Issued in 2022

    Dr. Hidaia Mahmood Alassouli

    book
  5. Common Windows, Linux and Web Server Systems Hacking Techniques

    Dr. Hidaia Mahmood Alassouli

    book
  6. Wireless and Mobile Hacking and Sniffing Techniques

    Dr. Hidaia Mahmood Alassouli

    book
  7. Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

    Dr. Hidaia Mahmood Alassouli

    book
  8. أبرز أحداث يوم القيامه في ضوء ما جاء بالقرآن الكريم والسنه النبوية الشريفة : The Most Prominent Events on the Day of Judgment and the Resurrection Based on Quran and Sunnah

    Dr. Hidaia Mahmood Alassouli

    book
  9. Fuse Protection against the Regenerative Circuit Internal Commutation Fault

    Dr. Hidaia Mahmood Alassouli

    book
  10. Comparison between Internet Fax Services

    Dr. Hidaia Mahmood Alassouli

    book
  11. Calculation of Critical Distance in Faulted Meshed Power System

    Dr. Hidaia Mahmood Alassouli

    book
  12. Introduction to Power System Protection

    Dr. Hidaia Mahmood Alassouli

    book

Others have also read

Skip the list
  1. Building Full Linux Mail Server Solution with Virtual Domains and Users

    Dr. Hedaya Mahmood Alasooly

    book
  2. Russian Cyber Attack - Grizzly Steppe Report & The Rules of Cyber Warfare : Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law

    U.S. Department of Defense, Department of Homeland Security, Federal Bureau of Investigation, Strategic Studies Institute, United States Army War College

    book
  3. Hacking your destiny

    Karl Lillrud

    audiobookbook
  4. Hacking Leadership : The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly

    Mike Myatt

    audiobook
  5. Hacking : Guide to Computer Hacking and Penetration Testing

    Alex Nordeen

    book
  6. Hacking into Hackers’ Head

    Kamal Nayan

    book
  7. Growth Hacking For Dummies

    Anuj Adhiya

    audiobook
  8. Hacking Marketing : The Ultimate Guide to Online Marketing Secrets, Learn How to Use Social Networking For Marketing and The Internet Marketing Mistakes You Need to Avoid

    Gregory Lawson

    audiobook
  9. Hacking Artificial Intelligence : A Leader's Guide from Deepfakes to Breaking Deep Learning

    Davey Gibian

    audiobook
  10. Ethical Hacking and Computer Securities For Beginners

    Elaiya Iswera Lallan

    book
  11. Linux : The Ultimate Beginner's Guide to Learn Linux Operating System, Command Line and Linux Programming Step by Step

    Ryan Turner

    audiobook
  12. Cyber Smart : Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

    Bart R. McDonough

    audiobook