Item type | Current library | Home library | Shelving location | Call number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | TK 5105.59 .G63 2010 (Browse shelf(Opens below)) | Available | 5017698 |
TK 5105.59 .F33 2003 Network Security : A Hacker's Perspective. | TK 5105.59 .F672 2008 Introduction to cryptography and network security / | TK 5105.59 .F675 2010 Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance / | TK 5105.59 .G63 2010 Network intrusion detection and prevention : concepts and techniques / | TK 5105.59 .H334 2006 Hacking exposed Cisco networks : Cisco security secrets & solutions / | TK 5105.59 .H455 2003 Securing wireless LANs : a practical guide for network managers, LAN administrators, and the home office user / | TK 5105.59 .H637 2009 IPv6 security / |
Includes bibliographical references and index
Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover
Electronic reproduction. New York : Springer, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on Aug. 9, 2010). Access may be restricted to users at subscribing institutions
There are no comments on this title.