Network intrusion detection and prevention

concepts and techniques

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
August 1, 2020 | History

Network intrusion detection and prevention

concepts and techniques

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.

Publish Date
Publisher
Springer
Language
English
Pages
212

Buy this book

Previews available in: English

Edition Availability
Cover of: Network intrusion detection and prevention
Network intrusion detection and prevention: concepts and techniques
2010, Springer
in English

Add another edition?

Book Details


Table of Contents

Network Attacks.
Detection Approaches.
Data Collection.
Theoretical Foundation Of Detection.
Architecture and Implementation.
Alert Management and Correlation.
Evaluation Criteria.
Intrusion Response.
Examples of Commercial and Open Source IDSs

Edition Notes

Includes bibliographical references and index.

Published in
New York
Series
Advances in information security -- ADIS 47, Advances in information security

Classifications

Library of Congress
TK5105.59 .G63 2010, QA76.9.A25TK5105.5-5, QA76.9.A25

The Physical Object

Pagination
xviii, 212 p. :
Number of pages
212

ID Numbers

Open Library
OL25155956M
Internet Archive
networkintrusion00ghor
ISBN 10
0387887709, 0387887717
ISBN 13
9780387887708, 9780387887715
LCCN
2009934522
OCLC/WorldCat
473398208

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 1, 2020 Edited by ImportBot import existing book
July 5, 2019 Edited by MARC Bot import existing book
January 4, 2012 Created by LC Bot import new book