000 | 01693cam a2200349 a 4500 | ||
---|---|---|---|
001 | 15734082 | ||
003 | APU | ||
005 | 20150813100316.0 | ||
008 | 090512s2010 njuab b 001 0 eng | ||
010 | _a 2009019158 | ||
015 |
_aGBA951486 _2bnb |
||
016 | 7 |
_a015265484 _2Uk |
|
020 | _a9780321591807 (pbk.) | ||
020 | _a0321591801 (pbk.) | ||
035 | _a(OCoLC)ocn318420991 | ||
040 |
_aDLC _cAPU _dBAHAR _dSM _beng |
||
050 | 0 | 0 |
_aTK5105.59 _b.T76 2010 |
082 | 0 | 0 |
_a005.8 _222 _bTRO 2010 |
100 | 1 |
_aTrost, Ryan. _911324 |
|
245 | 1 | 0 |
_aPractical intrusion analysis : _bprevention and detection for the twenty-first century / _cRyan Trost. |
260 |
_aUpper Saddle River, NJ : _bAddison-Wesley, _cc2010. |
||
300 |
_axxiv, 455 p. : _bill., maps ; _c24 cm. |
||
500 | _aIncludes index. | ||
505 | 0 | _aNetwork overview -- Infrastructure monitoring -- Intrusion detection systems -- Lifecycle of a vulnerability -- Proactive intrusion prevention and response via attack graphs -- Network flows and anomaly detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection for IT -- Geospatial intrusion detection -- Visual data communications -- Return on investment : business justification. | |
650 | 0 |
_aComputer networks _xSecurity measures. _977 |
|
650 | 0 |
_aComputer networks _xMonitoring. _911325 |
|
650 | 0 |
_aComputer security. _976 |
|
650 | 0 |
_aComputers _xAccess control. _9678 |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook |
||
999 |
_c6105 _d6105 |