Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

The State of the Art in Intrusion Prevention and Detection, 


Варианты приобретения
Цена: 8420.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания


Название:  The State of the Art in Intrusion Prevention and Detection
ISBN: 9781138033986
Издательство: Taylor&Francis
Классификация:

ISBN-10: 1138033987
Обложка/Формат: Paperback
Страницы: 514
Вес: 0.88 кг.
Дата издания: 16.11.2016
Язык: English
Иллюстрации: 47 tables, black and white; 168 illustrations, black and white
Размер: 181 x 254 x 33
Читательская аудитория: Tertiary education (us: college)
Ключевые слова: Computer security, COMPUTERS / Networking / General,COMPUTERS / Security / General
Основная тема: IT Security
Рейтинг:
Поставляется из: Европейский союз
Описание:

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.

Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.

The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.

The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.




Network Intrusion Detection and Prevention

Автор: Ali A. Ghorbani; Wei Lu; Mahbod Tavallaee
Название: Network Intrusion Detection and Prevention
ISBN: 1461424747 ISBN-13(EAN): 9781461424741
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285

Автор: Lammle
Название: SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285
ISBN: 1119155037 ISBN-13(EAN): 9781119155034
Издательство: Wiley
Рейтинг:
Цена: 8712.00 р.
Наличие на складе: Поставка под заказ.

Описание: Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives.

OSSEC Host-Based Intrusion Detection Guide,

Автор: Rory Bray
Название: OSSEC Host-Based Intrusion Detection Guide,
ISBN: 159749240X ISBN-13(EAN): 9781597492409
Издательство: Elsevier Science
Рейтинг:
Цена: 7656.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented.until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt. OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. . Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Автор: Mitnick, Kevin D.
Название: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
ISBN: 0764569597 ISBN-13(EAN): 9780764569593
Издательство: Wiley
Рейтинг:
Цена: 5542.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Kevin Mitnick, the world`s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Название: Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
ISBN: 1609608364 ISBN-13(EAN): 9781609608361
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network.

Privacy-Respecting Intrusion Detection

Автор: Ulrich Flegel
Название: Privacy-Respecting Intrusion Detection
ISBN: 1441941754 ISBN-13(EAN): 9781441941756
Издательство: Springer
Цена: 20263.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept, which led to security kernel architectures. In the mid to late 1970s a number of systems were designed and implemented using a security kernel architecture. These systems were mostly sponsored by the defense establishment and were not in wide use. Fast forwarding to more recent times, the advent of the world-wide web, inexp- sive workstations for the o?ce and home, and high-speed connections has made it possible for most people to be connected. This access has greatly bene?ted society allowing users to do their banking, shopping, and research on the Int- net. Most every business, government agency, and public institution has a public facing web page that can be accessed by anyone anywhere on the Internet. - fortunately, society s increased dependency on networked software systems has also given easy access to the attackers, and the number of attacks is steadily increasing."


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия