- Hands-On Network Forensics
- Nipun Jaswal
- 65字
- 2021-06-24 16:04:18
Firewall logs
Firewall logs provide a detailed view of activities on the network. Not only do firewall solutions protect a server or a network from unwanted connections, they also help to identify the type of traffic, provide a trust score to the outbound endpoint, block unwanted ports and connection attempts, and much more. We will look at firewalls in more detail in the upcoming chapters.
推薦閱讀
- 數(shù)字身份與元宇宙信任治理
- Metasploit Penetration Testing Cookbook(Third Edition)
- Penetration Testing with Perl
- Preventing Digital Extortion
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 從實(shí)踐中學(xué)習(xí)Kali Linux滲透測(cè)試
- 云原生安全與DevOps保障
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 人工智能安全(精裝版)
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- Android Application Security Essentials
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- Securing Network Infrastructure