000 03072cam a22004817a 4500
001 7867707
003 OSt
005 20210827105218.0
006 m d
007 cr n
008 090126s2010 nyua sb 001 0 eng d
015 _aGBA8C6117
_2bnb
015 _a990523004
_2dnb
016 7 _a014794000
_2Uk
020 _a9780387887708 (alk. paper)
035 _a(WaSeSS)ssj0000325088
038 _akhadija
040 _aUKM
_cUKM
_dCDX
_dYDXCP
_dGBVCP
_dVCV
_dCTB
_dWAU
_dLHU
_dNJI
_dDLC
_dWaSeSS
042 _aukblcatcopy
_alccopycat
050 4 _aTK5105.59
_b.G63 2010
082 0 0 _a005.8
_223
_bGHO
100 1 _aGhorbani, A. Ali
_d1954-
_981727
210 1 0 _aNetwork intrusion detection and prevention
245 1 0 _aNetwork intrusion detection and prevention
_bconcepts and techniques /
_cAli A. Ghorbani, Wei Lu, Mahbod Tavallaee.
260 _aNew York :
_bSpringer,
_cc2010.
490 1 _aAdvances in information security ;
_vADIS 47
504 _aIncludes bibliographical references and index.
505 0 _aNetwork Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs
506 _aLicense restrictions may limit access.
520 _aIntrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.
563 _ahard cover
650 0 _aIntrusion detection systems (Computer security)
_96106
650 0 _aIntrusion detection systems (Computer security)
_vCase studies.
_981728
650 0 _aComputer networks
_xSecurity measures.
_9466
650 0 _aComputer networks
_xSecurity measures
_vCase studies.
_981729
700 1 _aLu, Wei,
_d1980-
_981730
700 1 _aTavallaee, Mahbod.
_981731
773 0 _tSpringerLink ebooks - Computer Science (2010)
830 0 _aAdvances in information security
_981732
856 4 0 _uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio7867707
_zFull text available from SpringerLink ebooks - Computer Science (2010)
910 _aLibrary of Congress record
942 _2ddc
_cBK
999 _c32532
_d32532