<p><P>With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and large-s
Network Intrusion Detection and Prevention: Concepts and Techniques
β Scribed by Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
- Publisher
- Springer
- Year
- 2010
- Tongue
- English
- Leaves
- 223
- Series
- Advances in Information Security
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
<p><P>With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and large-s
<p>This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systemsβthe control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se