Stealing the Network: How to Own an Identity Stealing the Network: How to Own an Identity
٢٠٠٥
Wireshark & Ethereal Network Protocol Analyzer Toolkit Wireshark & Ethereal Network Protocol Analyzer Toolkit
٢٠٠٦
Snort 2.1 Intrusion Detection, Second Edition Snort 2.1 Intrusion Detection, Second Edition
٢٠٠٤
Penetration Tester's Open Source Toolkit (Enhanced Edition) Penetration Tester's Open Source Toolkit (Enhanced Edition)
٢٠٠٦
Nessus, Snort, and Ethereal Power Tools Nessus, Snort, and Ethereal Power Tools
٢٠٠٥