Books on the topic 'Host intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 books for your research on the topic 'Host intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textIngram, Dennis J. Autonomous agents for distributed intrusion detection in a multi-host environment. Naval Postgraduate School, 1999.
Find full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer Berlin Heidelberg, 2011.
Find full textBarrus, Joseph D. Intrusion detection in real-time in a multi-node, multi-host environment. Naval Postgraduate School, 1997.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Markt-und-Technik-Verl., 2003.
Find full textLhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textInstant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textNetwork Defense-in-Depth: Evaluating Host-Based Intrusion Detection Systems. Storming Media, 2001.
Find full textOSSEC Host-Based Intrusion Detection Guide. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-240-9.x0001-4.
Full textHay, Andrew, Daniel Cid, and Rory Bray. OSSEC Host-Based Intrusion Detection Guide. Elsevier Science & Technology Books, 2008.
Find full textSwartzbaugh, Richard Andrew. Internals of an Intrusion Detection System. Primedia eLaunch LLC, 2018.
Find full textMarrinan, Jean. Remote Sensor Monitoring : the Home Intruder Detection System: Intrusion Detection. Independently Published, 2021.
Find full textAutonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment. Storming Media, 1999.
Find full textCorchado, Emilio, and Álvaro Herrero. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer, 2014.
Find full textBlokdyk, Gerardus. Intrusion Detection System a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textNetwork Security: Distributed Approach in Intrusion Detection System. Vyusta Ventures LLP, 2022.
Find full textIntrusion Detection in Real Time in a Multi-Mode, Multi-Host Environment. Storming Media, 1997.
Find full textIntrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Diplomica Verlag, 2010.
Find full textIntrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Thomas Stein, 2010.
Find full text(Editor), Gregory J. Kirmeyer, Melinda Friedman (Editor), Katherine Martel (Editor), et al., eds. Pathogen Intrusion into the Distribution System. American Water Works Association, 2001.
Find full textRajendran, Praveen Kumar. Hybrid Intrusion Detection System for Private Cloud: From Research Perspective. Independently Published, 2018.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textGondaliya, Tapan. Intrusion Detection System in Mobile Ad Hoc Network in Mac Layer. GRIN Verlag GmbH, 2014.
Find full textCCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.
Find full textUsing a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.
Find full textNils Otto vor dem gentschen Felde and Nils Otto Vor Dem Gentschen Felde. Ein föderiertes Intrusion Detection System für Grids: Dissertation an der Fakultät für Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universität München. Books on Demand GmbH, 2009.
Find full textHilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full text