The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.
Material type:
TextPublisher: Boca Raton, [Florida] : CRC Press/Taylor & Francis Group, [2014]Description: xvii, 496 pages : illustrations ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781482203516 (hbk. : alk. paper)Subject(s): Computer security | Computers -- Access control | Computer networks -- Security measures | COMPUTERS / Networking / General | COMPUTERS / Security / GeneralDDC classification: 005.8 PAT LOC classification: QA76.9.A25 | S7354 2014Other classification: COM043000 | COM053000 Summary: "This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention"-- Provided by publisher.
| Item type | Current location | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Central Library (CL) | Central Library (CL) | NFIC | First Floor - Artificial Intelligence/Data Mining | 005.8 PAT (Browse shelf) | Checked out | 04/30/2026 | SEECS013758 |
Includes bibliographical references and index.
"This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention"-- Provided by publisher.

Book
There are no comments on this title.