Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Privacy-Respecting Intrusion Detection, Ulrich Flegel


Варианты приобретения
Цена: 20263.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Ulrich Flegel
Название:  Privacy-Respecting Intrusion Detection
ISBN: 9781441941756
Издательство: Springer
Классификация: ISBN-10: 1441941754
Обложка/Формат: Paperback
Страницы: 327
Вес: 0.46 кг.
Дата издания: 2007
Серия: Advances in Information Security
Язык: English
Размер: 234 x 156 x 18
Читательская аудитория: Professionals
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept, which led to security kernel architectures. In the mid to late 1970s a number of systems were designed and implemented using a security kernel architecture. These systems were mostly sponsored by the defense establishment and were not in wide use. Fast forwarding to more recent times, the advent of the world-wide web, inexp- sive workstations for the o?ce and home, and high-speed connections has made it possible for most people to be connected. This access has greatly bene?ted society allowing users to do their banking, shopping, and research on the Int- net. Most every business, government agency, and public institution has a public facing web page that can be accessed by anyone anywhere on the Internet. - fortunately, society s increased dependency on networked software systems has also given easy access to the attackers, and the number of attacks is steadily increasing.


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Автор: Mitnick, Kevin D.
Название: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
ISBN: 0764569597 ISBN-13(EAN): 9780764569593
Издательство: Wiley
Рейтинг:
Цена: 5542.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Kevin Mitnick, the world`s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Название: Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
ISBN: 1609608364 ISBN-13(EAN): 9781609608361
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network.

Mobile Hybrid Intrusion Detection

Автор: ?lvaro Herrero; Emilio Corchado
Название: Mobile Hybrid Intrusion Detection
ISBN: 3642423418 ISBN-13(EAN): 9783642423413
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book.This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level.

Recent Advances in Intrusion Detection

Автор: Christopher Kruegel; Richard Lippmann; Andrew Clar
Название: Recent Advances in Intrusion Detection
ISBN: 3540743197 ISBN-13(EAN): 9783540743194
Издательство: Springer
Рейтинг:
Цена: 10480.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Constitutes the proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID 2007, held in Gold Coast, Australia in September 2007. This work contains 17 papers that are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment and malware collection and analysis.

OSSEC Host-Based Intrusion Detection Guide,

Автор: Rory Bray
Название: OSSEC Host-Based Intrusion Detection Guide,
ISBN: 159749240X ISBN-13(EAN): 9781597492409
Издательство: Elsevier Science
Рейтинг:
Цена: 7656.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented.until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt. OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. . Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are

Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network

Автор: Crothers
Название: Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network
ISBN: 0764549499 ISBN-13(EAN): 9780764549496
Издательство: Wiley
Рейтинг:
Цена: 6732.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия