| 000 | 03072cam a22004817a 4500 | ||
|---|---|---|---|
| 001 | 7867707 | ||
| 003 | OSt | ||
| 005 | 20210827105218.0 | ||
| 006 | m d | ||
| 007 | cr n | ||
| 008 | 090126s2010 nyua sb 001 0 eng d | ||
| 015 |
_aGBA8C6117 _2bnb |
||
| 015 |
_a990523004 _2dnb |
||
| 016 | 7 |
_a014794000 _2Uk |
|
| 020 | _a9780387887708 (alk. paper) | ||
| 035 | _a(WaSeSS)ssj0000325088 | ||
| 038 | _akhadija | ||
| 040 |
_aUKM _cUKM _dCDX _dYDXCP _dGBVCP _dVCV _dCTB _dWAU _dLHU _dNJI _dDLC _dWaSeSS |
||
| 042 |
_aukblcatcopy _alccopycat |
||
| 050 | 4 |
_aTK5105.59 _b.G63 2010 |
|
| 082 | 0 | 0 |
_a005.8 _223 _bGHO |
| 100 | 1 |
_aGhorbani, A. Ali _d1954- _981727 |
|
| 210 | 1 | 0 | _aNetwork intrusion detection and prevention |
| 245 | 1 | 0 |
_aNetwork intrusion detection and prevention _bconcepts and techniques / _cAli A. Ghorbani, Wei Lu, Mahbod Tavallaee. |
| 260 |
_aNew York : _bSpringer, _cc2010. |
||
| 490 | 1 |
_aAdvances in information security ; _vADIS 47 |
|
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aNetwork Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs | |
| 506 | _aLicense restrictions may limit access. | ||
| 520 | _aIntrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover. | ||
| 563 | _ahard cover | ||
| 650 | 0 |
_aIntrusion detection systems (Computer security) _96106 |
|
| 650 | 0 |
_aIntrusion detection systems (Computer security) _vCase studies. _981728 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _9466 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _vCase studies. _981729 |
|
| 700 | 1 |
_aLu, Wei, _d1980- _981730 |
|
| 700 | 1 |
_aTavallaee, Mahbod. _981731 |
|
| 773 | 0 | _tSpringerLink ebooks - Computer Science (2010) | |
| 830 | 0 |
_aAdvances in information security _981732 |
|
| 856 | 4 | 0 |
_uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio7867707 _zFull text available from SpringerLink ebooks - Computer Science (2010) |
| 910 | _aLibrary of Congress record | ||
| 942 |
_2ddc _cBK |
||
| 999 |
_c32532 _d32532 |
||