000 01693cam a2200349 a 4500
001 15734082
003 APU
005 20150813100316.0
008 090512s2010 njuab b 001 0 eng
010 _a 2009019158
015 _aGBA951486
_2bnb
016 7 _a015265484
_2Uk
020 _a9780321591807 (pbk.)
020 _a0321591801 (pbk.)
035 _a(OCoLC)ocn318420991
040 _aDLC
_cAPU
_dBAHAR
_dSM
_beng
050 0 0 _aTK5105.59
_b.T76 2010
082 0 0 _a005.8
_222
_bTRO 2010
100 1 _aTrost, Ryan.
_911324
245 1 0 _aPractical intrusion analysis :
_bprevention and detection for the twenty-first century /
_cRyan Trost.
260 _aUpper Saddle River, NJ :
_bAddison-Wesley,
_cc2010.
300 _axxiv, 455 p. :
_bill., maps ;
_c24 cm.
500 _aIncludes index.
505 0 _aNetwork overview -- Infrastructure monitoring -- Intrusion detection systems -- Lifecycle of a vulnerability -- Proactive intrusion prevention and response via attack graphs -- Network flows and anomaly detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection for IT -- Geospatial intrusion detection -- Visual data communications -- Return on investment : business justification.
650 0 _aComputer networks
_xSecurity measures.
_977
650 0 _aComputer networks
_xMonitoring.
_911325
650 0 _aComputer security.
_976
650 0 _aComputers
_xAccess control.
_9678
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBook
999 _c6105
_d6105