Network Intrusion Detection and Prevention: Concepts and Techniques

Author:   Ali A. Ghorbani ,  Wei Lu ,  Mahbod Tavallaee
Publisher:   Springer-Verlag New York Inc.
Edition:   2010 ed.
Volume:   47
ISBN:  

9780387887708


Pages:   216
Publication Date:   28 October 2009
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $261.36 Quantity:  
Add to Cart

Share |

Network Intrusion Detection and Prevention: Concepts and Techniques


Add your own review!

Overview

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Full Product Details

Author:   Ali A. Ghorbani ,  Wei Lu ,  Mahbod Tavallaee
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2010 ed.
Volume:   47
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.50cm
Weight:   1.110kg
ISBN:  

9780387887708


ISBN 10:   0387887709
Pages:   216
Publication Date:   28 October 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Network Attacks.- Detection Approaches.- Data Collection.- Theoretical Foundation of Detection.- Architecture and Implementation.- Alert Management and Correlation.- Evaluation Criteria.- Intrusion Response.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List