Network Intrusion Detection and Prevention: Concepts and Techniques

Author:   Ali A. Ghorbani ,  Wei Lu ,  Mahbod Tavallaee
Publisher:   Springer-Verlag New York Inc.
Edition:   2010 ed.
Volume:   47
ISBN:  

9781461424741


Pages:   216
Publication Date:   25 February 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $422.37 Quantity:  
Add to Cart

Share |

Network Intrusion Detection and Prevention: Concepts and Techniques


Add your own review!

Overview

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Full Product Details

Author:   Ali A. Ghorbani ,  Wei Lu ,  Mahbod Tavallaee
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2010 ed.
Volume:   47
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9781461424741


ISBN 10:   1461424747
Pages:   216
Publication Date:   25 February 2012
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Network Attacks.- Detection Approaches.- Data Collection.- Theoretical Foundation of Detection.- Architecture and Implementation.- Alert Management and Correlation.- Evaluation Criteria.- Intrusion Response.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List