000 02840cam a22004337a 4500
001 15861242
003 APU
005 20160223051503.0
008 090810s2010 nyua b 001 0 eng
010 _a 2009934522
015 _aGBA8C6117
_2bnb
015 _a990523004
_2dnb
016 7 _a014794000
_2Uk
020 _a9780387887708 (hbk.)
035 _a(OCoLC)ocn473398208
040 _aUKM
_cUKM
_dNEDA
_dANA
_beng
042 _aukblcatcopy
_alccopycat
050 0 0 _aTK5105.59
_b.G46 2010
082 0 0 _a005.8
_222
_bGHO 2010
100 1 _aGhorbani, Ali A,
_d1954-
_911434
245 1 0 _aNetwork intrusion detection and prevention :
_bconcepts and techniques /
_cAli A. Ghorbani, Wei Lu, Mahbod Tavallaee.
260 _aNew York :
_bSpringer,
_cc2010.
300 _axviii, 212 p. :
_bill. ;
_c24 cm.
490 1 _aAdvances in information security ;
_vADIS 47
504 _aIncludes bibliographical references and index.
505 0 _aNetwork Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs
520 _aIntrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.
650 0 _aIntrusion detection systems (Computer security)
_911277
650 0 _aIntrusion detection systems (Computer security)
_vCase studies.
_911435
650 0 _aComputer networks
_xSecurity measures.
_977
650 0 _aComputer networks
_xSecurity measures
_vCase studies.
_911436
700 1 _aLu, Wei,
_d1980-
_911437
700 1 _aTavallaee, Mahbod.
_911438
830 0 _aAdvances in information security
_911439
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cBook
_04
999 _c6166
_d6166