The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

Contributor(s): Pathan, Al-Sakib KhanMaterial type: TextTextPublisher: Boca Raton, [Florida] : CRC Press/Taylor & Francis Group, [2014]Description: xvii, 496 pages : illustrations ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781482203516 (hbk. : alk. paper)Subject(s): Computer security | Computers -- Access control | Computer networks -- Security measures | COMPUTERS / Networking / General | COMPUTERS / Security / GeneralDDC classification: 005.8 PAT LOC classification: QA76.9.A25 | S7354 2014Other classification: COM043000 | COM053000 Summary: "This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Shelving location Call number Status Date due Barcode Item holds
Book Book Central Library (CL)
Central Library (CL)
NFIC First Floor - Artificial Intelligence/Data Mining 005.8 PAT (Browse shelf) Available SEECS013758
Total holds: 0

Includes bibliographical references and index.

"This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention"-- Provided by publisher.

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.