Books on the topic 'Network security intrusion detection'

To see the other types of publications on this topic, follow the link: Network security intrusion detection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Network security intrusion detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Judy, Novak, ed. Network intrusion detection. 3rd ed. Indianapolis, Ind: New Riders Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Escamilla, Terry. Intrusion detection: Network security beyond the firewall. New York: John Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Intrusion detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Network intrusion detection: An analyst's handbook. Indianapolis, Ind: New Riders, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Judy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. Indianapolis, Ind: New Riders, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Boston, MA: Springer-Verlag US, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, MA: Thomson Course Technology PTR, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Intrusion detection with Snort. Indianapolis, Ind: Sams, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

C, Foster James, ed. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

The Tao of network security monitoring: Beyond intrusion detection. Boston: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. London: Imperial College Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York, NY: Springer New York, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Statistical techniques for network security: Modern statistically-based intrusion detection and protection. Hershey, PA: Information Science Reference, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Whitman, Michael E. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Greg, Holden, ed. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Raouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Boca Raton, [Florida]: Taylor & Francis/CRC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Network anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

United States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

United States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Implementing intrusion detection systems: A hands-on guide for securing the network. Indianapolis, IN: Wiley Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Privacy, intrusion detection, and response: Technologies for protecting networks. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ning, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Boston, MA: Springer US, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

The state of the art in intrusion prevention and detection. Boca Raton, [Florida]: CRC Press/Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Boston: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Intrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response. Sparta, N.J: Intrusion.Net Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Trost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Upper Saddle River, NJ: Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Intrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Upper Saddle River, N.J: Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Carl, Timm, ed. CCSP Secure Intrusion Detection and SAFE Implementation study guide (642-531 and 642-541). San Francisco, Calif: SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Somesh, Jha, Balzarotti Davide, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Christopher, Gerg, ed. Managing Security with Snort and IDS Tools. Beijing: O'Reilly, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ghorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Extrusion detection: Security monitoring for internal intrusions. Upper Saddle River, NJ: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Intrusion detection systems. 2nd ed. Boston: Butterworths, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Marchette, David J. Computer Intrusion Detection and Network Monitoring. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Kwangjo, Muhamad Erza Aminanto, and Harry Chandra Tanuwidjaja. Network Intrusion Detection using Deep Learning. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1444-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Beale, Jay. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

1969-, Russell Ryan, Mullen Timothy M, and Pinzon Scott, eds. Stealing the network: How to own a shadow : the chase for Knuth. Rockland, Mass: Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Proctor, Paul E. Practical intrusion detection handbook. Upper Saddle River, N.J: Prentice Hall PTR, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bace, Rebecca Gurley. Intrusion Detection. Sams, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Staff, Cisco Learning Institute. Intrusion Detection. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Network Intrusion Analysis. Syngress Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Intrusion Detection Systems. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Novak, Judy, and Stephen Northcutt. Network Intrusion Detection: An Analyst's Handbook (2nd Edition). 2nd ed. New Riders Publishing, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

(Editor), Caswell, ed. Snort 2.1 Intrusion Detection. 2nd ed. Syngress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lu, Wei, Ali A. A. Ghorbani, and Mahbod Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography