Content deleted Content added
m Reverted edits by Gingerzombie123 (talk) to last version by Wtmitchell |
Citation bot (talk | contribs) m Alter: isbn. | You can use this bot yourself. Report bugs here. | User-activated. |
||
Line 59:
{{reflist|refs=
<ref name=newman2009>{{cite book | first=Robert C. | last=Newman | year=2009 | title=Computer Security: Protecting Digital Resources | publisher=Jones & Bartlett Learning | isbn=978-0-7637-5994-
<ref name=cn31_8_805>{{cite journal | first1=Hervé | last1=Debar | first2=Marc | last2=Dacier | first3=Andreas | last3=Wespi | title=Towards a taxonomy of intrusion-detection systems | journal=Computer Networks | volume=31 | issue=8 | date=23 April 1999 | pages=805–822 | doi=10.1016/S1389-1286(98)00017-6 }}</ref>
Line 66:
<ref name=cox_gerg2004>{{cite book | first1=Kerry | last1=Cox | first2=Christopher | last2=Gerg | year=2004 | page=3 | title=Managing security with Snort and IDS tools
| series=O'Reilly Series | publisher=O'Reilly Media, Inc. | isbn=978-0-596-00661-
}}
|