Normal view MARC view ISBD view

The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

Contributor(s): Pathan, Al-Sakib Khan [editor.].
Material type: materialTypeLabelBookPublisher: Boca Raton, [Florida] : CRC Press/Taylor & Francis Group, 2014Description: 1 online resource.ISBN: 9780429090578.Subject(s): Computer security | Computers -- Access control | Computer networks -- Security measuresAdditional physical formats: Print version: : No titleDDC classification: 005.8 Online resources: Click here to view.
Contents:
part 1. Network traffic analysis and management for IDS -- part 2. IDS issues for different infrastructures -- part 3. Artificial intelligence techniques for IDS -- part 4. IDS for wireless systems.
Summary: This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention-- Provided by publisher.
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references.

part 1. Network traffic analysis and management for IDS -- part 2. IDS issues for different infrastructures -- part 3. Artificial intelligence techniques for IDS -- part 4. IDS for wireless systems.

This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention-- Provided by publisher.

There are no comments for this item.

Log in to your account to post a comment.