Intrusion Detection Systems Intrusion Detection Systems
    • $119.99

Publisher Description

In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs).

Intrusion Detection Systems is an edited volume by world class leaders in this field.
This edited volume sheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. This volume is presented in an easy-to-follow style while including a rigorous treatment of the issues, solutions, and technologies tied to the field.

Intrusion Detection Systems is designed for a professional audience composed of researchers and practitioners within the computer network and information security industry. It is also suitable as a reference or secondary textbook for advanced-level students in computer science.

GENRE
Computers & Internet
RELEASED
2008
June 12
LANGUAGE
EN
English
LENGTH
264
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
3.2
MB
Managing Cyber Threats Managing Cyber Threats
2006
Information Assurance Information Assurance
2010
Secure IT Systems Secure IT Systems
2016
Critical Information Infrastructures Security Critical Information Infrastructures Security
2010
Risks and Security of Internet and Systems Risks and Security of Internet and Systems
2021
Information Systems Security Information Systems Security
2022
Il Primo Sognatore Il Primo Sognatore
2025
The Original Dreamer The Original Dreamer
2025
Network and System Security Network and System Security
2025
From Overthinking to Inner Peace : A Journey To Mindful Living From Overthinking to Inner Peace : A Journey To Mindful Living
2025
Cryptology and Network Security Cryptology and Network Security
2024
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007