Books on the topic 'Network security intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Network security intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Judy, Novak, ed. Network intrusion detection. 3rd ed. Indianapolis, Ind: New Riders Pub., 2002.
Find full textEscamilla, Terry. Intrusion detection: Network security beyond the firewall. New York: John Wiley, 1998.
Find full textIntrusion detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.
Find full textNetwork intrusion detection: An analyst's handbook. Indianapolis, Ind: New Riders, 1999.
Find full textJudy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. Indianapolis, Ind: New Riders, 2001.
Find full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Boston, MA: Springer-Verlag US, 2008.
Find full textManu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, MA: Thomson Course Technology PTR, 2008.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.
Find full textIntrusion detection with Snort. Indianapolis, Ind: Sams, 2003.
Find full textC, Foster James, ed. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full textThe Tao of network security monitoring: Beyond intrusion detection. Boston: Addison-Wesley, 2005.
Find full text-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. London: Imperial College Press, 2011.
Find full textComputer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York, NY: Springer New York, 2001.
Find full textStatistical techniques for network security: Modern statistically-based intrusion detection and protection. Hershey, PA: Information Science Reference, 2008.
Find full textWhitman, Michael E. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.
Find full textGreg, Holden, ed. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.
Find full textRaouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Boca Raton, [Florida]: Taylor & Francis/CRC, 2014.
Find full textNetwork anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textImplementing intrusion detection systems: A hands-on guide for securing the network. Indianapolis, IN: Wiley Pub., 2003.
Find full textPrivacy, intrusion detection, and response: Technologies for protecting networks. Hershey, PA: Information Science Reference, 2012.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Boston, MA: Springer US, 2004.
Find full textThe state of the art in intrusion prevention and detection. Boca Raton, [Florida]: CRC Press/Taylor & Francis Group, 2014.
Find full textSushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Boston: Kluwer Academic Publishers, 2004.
Find full textIntrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response. Sparta, N.J: Intrusion.Net Books, 1998.
Find full textTrost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textIntrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Upper Saddle River, N.J: Prentice Hall PTR, 2003.
Find full textCarl, Timm, ed. CCSP Secure Intrusion Detection and SAFE Implementation study guide (642-531 and 642-541). San Francisco, Calif: SYBEX, 2004.
Find full textDasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.
Find full textDasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.
Find full textSomesh, Jha, Balzarotti Davide, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textPlanning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
Find full textChristopher, Gerg, ed. Managing Security with Snort and IDS Tools. Beijing: O'Reilly, 2004.
Find full textGhorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.
Full textExtrusion detection: Security monitoring for internal intrusions. Upper Saddle River, NJ: Addison-Wesley, 2005.
Find full textIntrusion detection systems. 2nd ed. Boston: Butterworths, 1988.
Find full textMarchette, David J. Computer Intrusion Detection and Network Monitoring. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4.
Full textKim, Kwangjo, Muhamad Erza Aminanto, and Harry Chandra Tanuwidjaja. Network Intrusion Detection using Deep Learning. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1444-5.
Full textBeale, Jay. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full text1969-, Russell Ryan, Mullen Timothy M, and Pinzon Scott, eds. Stealing the network: How to own a shadow : the chase for Knuth. Rockland, Mass: Syngress, 2007.
Find full textProctor, Paul E. Practical intrusion detection handbook. Upper Saddle River, N.J: Prentice Hall PTR, 2001.
Find full textBace, Rebecca Gurley. Intrusion Detection. Sams, 1999.
Find full textStaff, Cisco Learning Institute. Intrusion Detection. Pearson Education, Limited, 2005.
Find full textNetwork Intrusion Analysis. Syngress Publishing, 2012.
Find full textIntrusion Detection Systems. Springer, 2010.
Find full textNovak, Judy, and Stephen Northcutt. Network Intrusion Detection: An Analyst's Handbook (2nd Edition). 2nd ed. New Riders Publishing, 2000.
Find full textBennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.
Find full text(Editor), Caswell, ed. Snort 2.1 Intrusion Detection. 2nd ed. Syngress, 2004.
Find full textLu, Wei, Ali A. A. Ghorbani, and Mahbod Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2012.
Find full text