Books on the topic 'Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Mu nchen/Germany: Markt-und-Technik-Verl., 2003.
Find full textIntrusion detection systems. 2nd ed. Boston: Butterworths, 1988.
Find full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Boston, MA: Springer-Verlag US, 2008.
Find full textNing, Peng, Sushil Jajodia, and X. Sean Wang. Intrusion Detection in Distributed Systems. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0467-2.
Full textBeale, Jay. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full textC, Foster James, ed. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full textSwarnkar, Mayank, and Shyam Singh Rajput. Artificial Intelligence for Intrusion Detection Systems. Boca Raton: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003346340.
Full textNational Institute of Standards and Technology (U.S.), ed. An overview of issues in testing intrusion detection systems. Gaithersburg, Md: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Boston, MA: Springer US, 2004.
Find full textSushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Boston: Kluwer Academic Publishers, 2004.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.
Find full textComputer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York, NY: Springer New York, 2001.
Find full textImplementing intrusion detection systems: A hands-on guide for securing the network. Indianapolis, IN: Wiley Pub., 2003.
Find full textPeck, Lindamae. Cold regions performance of optical-fiber and pulsed near-infrared intrusion detection systems. [Hanover, N.H.]: U.S. Army Corps of Engineers, Cold Regions Research & Engineering Laboratory, 1994.
Find full textIntrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Upper Saddle River, N.J: Prentice Hall PTR, 2003.
Find full textStephen, Northcutt, and Edmead Mark T, eds. Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. Indianapolis, Ind: New Riders, 2003.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2006: 17-18 April 2006, Kissimmee, Florida, USA. Bellingham, Wash: SPIE, 2006.
Find full textPeter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2007.
Find full textV, Dasarathy Belur, Society of Photo-optical Instrumentation Engineers., and Ball Aerospace & Technologies Corporation (USA), eds. Data mining, intrusion detection, information assurance, and data networks security 2005: 28-29 March, 2005, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2005.
Find full textDavid, Hutchison. Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textCarter, Earl. Cisco Secure Intrusion Detection System. Cisco Press, 2001.
Find full textSwartzbaugh, Richard Andrew. Internals of an Intrusion Detection System. Primedia eLaunch LLC, 2018.
Find full textLhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textInstant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textCorchado, Emilio, and Álvaro Herrero. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer, 2014.
Find full textBlokdyk, Gerardus. Intrusion Detection System a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textNetwork Security: Distributed Approach in Intrusion Detection System. Vyusta Ventures LLP, 2022.
Find full textIntrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Thomas Stein, 2010.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textRajendran, Praveen Kumar. Hybrid Intrusion Detection System for Private Cloud: From Research Perspective. Independently Published, 2018.
Find full text(Editor), Gregory J. Kirmeyer, Melinda Friedman (Editor), Katherine Martel (Editor), Doug Howie (Editor), Mark Lechevallier (Editor), Morteza Abbaszadegan (Editor), Mohammed Karim (Editor), James Funk (Editor), and Joseph Harbour (Editor), eds. Pathogen Intrusion into the Distribution System. American Water Works Association, 2001.
Find full textCCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.
Find full textUsing a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.
Find full textAkselsen, Beata. Intrusion Detection Systems. Scitus Academics LLC, 2017.
Find full textIntrusion Detection Systems. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77265-3.
Full textSkrobanek, Pawel, ed. Intrusion Detection Systems. InTech, 2011. http://dx.doi.org/10.5772/593.
Full textBarnard, Robert. Intrusion Detection Systems. Elsevier Science & Technology Books, 1988.
Find full textIntrusion Detection Systems. Elsevier Science & Technology Books, 1988.
Find full textBarnard, Robert. Intrusion Detection Systems. Elsevier Science & Technology, 2005.
Find full textIntrusion Detection Systems. Springer, 2010.
Find full textBarnard, Robert L. Intrusion Detection Systems. Elsevier Science & Technology Books, 1988.
Find full textHeath, Toby. Intrusion Detection Systems. Wiley & Sons, Incorporated, John, 2017.
Find full textSHETTY, PRAVIN. DISTRIBUTED INTRUSION: Detection Systems. VDM Verlag Dr. Müller, 2010.
Find full text