000 | 02568nam a2200349Ia 4500 | ||
---|---|---|---|
001 | 31139 | ||
008 | 100909s2010 nyua b 001 0 eng d | ||
020 |
_a9780387887708 (hbk.) : _c99.00 |
||
050 | 1 | 4 |
_aTK5105.59 _b.G63 2010 |
090 | _aTK 5105.59 .G63 2010 | ||
100 | 1 |
_aGhorbani, Ali, _d1954- _911566 |
|
245 | 1 | 0 |
_aNetwork intrusion detection and prevention : _bconcepts and techniques / _cAli A. Ghorbani, Wei Lu, Mahbod Taballaee |
260 |
_aNew York : _bSpringer, _cc2010 |
||
300 |
_axviii, 212 p. : _bill. ; _c24 cm |
||
490 | 1 |
_aAdvances in information security ; _vADIS 47 |
|
504 | _aIncludes bibliographical references and index | ||
520 | _aIntrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover | ||
533 |
_aElectronic reproduction. _bNew York : _cSpringer, _d2010. _nMode of access: World Wide Web. _nSystem requirements: Web browser. _nTitle from title screen (viewed on Aug. 9, 2010). _nAccess may be restricted to users at subscribing institutions |
||
650 | 0 |
_aIntrusion detection systems (Computer security) _9146180 |
|
650 | 0 |
_aIntrusion detection systems (Computer security) _vCase studies _9146181 |
|
650 | 0 |
_aComputer networks _xSecurity measures _9146182 |
|
650 | 0 |
_aComputer networks _xSecurity measures _vCase studies _9146183 |
|
700 | 1 |
_aLu, Wei, _d1980- _925459 |
|
700 | 1 |
_aTavallaee, Mahbod _9146184 |
|
830 | 0 |
_aAdvances in information security _9146185 |
|
852 | 1 | _9P99.00usd | |
907 |
_a31139 _b02-13-11 _c01-31-11 |
||
942 |
_cBOOK _00 |
||
998 |
_aaudmc _b02-13-11 _cm _da _e- _feng _gnyu _h0 |
||
945 |
_g0 _i5017698 _j0 _laudmc _o- _p363.63 _q- _r- _s- _t1 _u0 _v0 _w0 _x0 _yi12263308 _z01-31-11 |
||
999 |
_c31139 _d31139 |