000 | 02840cam a22004337a 4500 | ||
---|---|---|---|
001 | 15861242 | ||
003 | APU | ||
005 | 20160223051503.0 | ||
008 | 090810s2010 nyua b 001 0 eng | ||
010 | _a 2009934522 | ||
015 |
_aGBA8C6117 _2bnb |
||
015 |
_a990523004 _2dnb |
||
016 | 7 |
_a014794000 _2Uk |
|
020 | _a9780387887708 (hbk.) | ||
035 | _a(OCoLC)ocn473398208 | ||
040 |
_aUKM _cUKM _dNEDA _dANA _beng |
||
042 |
_aukblcatcopy _alccopycat |
||
050 | 0 | 0 |
_aTK5105.59 _b.G46 2010 |
082 | 0 | 0 |
_a005.8 _222 _bGHO 2010 |
100 | 1 |
_aGhorbani, Ali A, _d1954- _911434 |
|
245 | 1 | 0 |
_aNetwork intrusion detection and prevention : _bconcepts and techniques / _cAli A. Ghorbani, Wei Lu, Mahbod Tavallaee. |
260 |
_aNew York : _bSpringer, _cc2010. |
||
300 |
_axviii, 212 p. : _bill. ; _c24 cm. |
||
490 | 1 |
_aAdvances in information security ; _vADIS 47 |
|
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aNetwork Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs | |
520 | _aIntrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover. | ||
650 | 0 |
_aIntrusion detection systems (Computer security) _911277 |
|
650 | 0 |
_aIntrusion detection systems (Computer security) _vCase studies. _911435 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _977 |
|
650 | 0 |
_aComputer networks _xSecurity measures _vCase studies. _911436 |
|
700 | 1 |
_aLu, Wei, _d1980- _911437 |
|
700 | 1 |
_aTavallaee, Mahbod. _911438 |
|
830 | 0 |
_aAdvances in information security _911439 |
|
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook _04 |
||
999 |
_c6166 _d6166 |