Academic literature on the topic 'Intrusion Prevention System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion Prevention System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intrusion Prevention System"

1

Kaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.

Full text
Abstract:
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathw
APA, Harvard, Vancouver, ISO, and other styles
2

Ninawe, Shreyash, Vilas Bariyekar, and Ranjita Asati. "Network Intrusion Prevention System." IJARCCE 8, no. 2 (2019): 196–99. http://dx.doi.org/10.17148/ijarcce.2019.8235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farhaoui, Yousef. "Intrusion Prevention System Inspired Immune Systems." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 1 (2016): 168. http://dx.doi.org/10.11591/ijeecs.v2.i1.pp168-179.

Full text
Abstract:
<p>In view of new communication and information technologies that appeared with the emergence of networks and Internet, the computer security became a major challenge, and works in this research axis are increasingly numerous. Various tools and mechanisms are developed in order to guarantee a safety level up to the requirements of modern life. Among them, intrusion detection and prevention systems (IDPS) intended to locate activities or abnormal behaviors suspect to be detrimental to the correct operation of the system. The purpose of this work is the design and the realization of an IDP
APA, Harvard, Vancouver, ISO, and other styles
4

Stiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "Characterizing Network Intrusion Prevention System." International Journal of Computer Applications 14, no. 1 (2011): 11–18. http://dx.doi.org/10.5120/1811-2439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.

Full text
Abstract:
Intrusion is one of the biggest problems in wireless sensor networks. Because of the evolution in wired and wireless mechanization, various archetypes are used for communication. But security is the major concern as networks are more prone to intrusions. An intrusion can be dealt in two ways: either by detecting an intrusion in a wireless sensor network or by preventing an intrusion in a wireless sensor network. Many researchers are working on detecting intrusions and less emphasis is given on intrusion prevention. One of the modern techniques for averting intrusions is through fuzzy logic. In
APA, Harvard, Vancouver, ISO, and other styles
6

Safana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS detect
APA, Harvard, Vancouver, ISO, and other styles
7

Safana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate  a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.

Full text
Abstract:
The security of Internet of Things (IoT) networks has become a integral problem in view of the exponential growth of IoT devices. Intrusion detection and prevention is an approach ,used to identify, analyze, and block cyber threats to protect IoT from unauthorized access or attacks. This paper introduces an adaptive and incremental intrusion detection and prevention system based on RNNs, to the ever changing field of IoT security. IoT networks require advanced intrusion detection systems that can identify emerging threats because of their various and dynamic data sources. The complexity of IoT
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Thawda Win. "Survival of an Intrusion Tolerance Database System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1748–51. https://doi.org/10.5281/zenodo.3591410.

Full text
Abstract:
While traditional secure database systems rely on prevention control and are very limited in surviving malicious attack, an intrusion tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. The emphasis of survivability is on continuity of operations, with the understanding that the security precautions cannot guarantee that systems will not be penetrated and compromised. In this paper, we propose a framework of model based evaluation of the survivable intrusion tolerant database system. We focus on m
APA, Harvard, Vancouver, ISO, and other styles
10

Tasneem, Aaliya, Abhishek Kumar, and Shabnam Sharma. "Intrusion Detection Prevention System using SNORT." International Journal of Computer Applications 181, no. 32 (2018): 21–24. http://dx.doi.org/10.5120/ijca2018918280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Intrusion Prevention System"

1

Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.

Full text
Abstract:
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar
APA, Harvard, Vancouver, ISO, and other styles
3

Strnad, Matěj. "Návrh zabezpečení průmyslového řídícího systému." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399322.

Full text
Abstract:
The subject of the master's thesis is a design of security measures for securing of an industrial control system. It includes an analysis of characteristics of communication environment and specifics of industrial communication systems, a comparison of available technological means and a design of a solution according to investor's requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
APA, Harvard, Vancouver, ISO, and other styles
5

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System
APA, Harvard, Vancouver, ISO, and other styles
6

Ivvala, Avinash Kiran. "Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14056.

Full text
Abstract:
Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. There are Denial of Service and Distributed Denial of Service attacks which are generated by the attackers to challenge the security of CC. The Next-Generation Intrusion Prevention Systems (sometimes referred as Non-Traditional Intrusion Prevention Systems (NGIPS) are being used as a measure to protect users against these attacks. This research is
APA, Harvard, Vancouver, ISO, and other styles
7

Hanna, Johan. "Åtgärder för att motverka säkerhetsbrister i katalogtjänster." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39469.

Full text
Abstract:
Katalogtjänster är och förblir en central och kritisk del i informationssystem. I katalogtjänsterna samlas stora mängder information om användare och behörigheter för respektive användare. I högriskmiljöer, där bland annat hemlig och annan skyddsvärd information samlas, är katalogtjänsterna i en utsatt situation. Om en katalogtjänst svarar fel på en resursförfrågan kan konsekvenserna vara stora. Arbetet grundade sig i att med hjälp av olika säkerhetshöjande åtgärder bygga upp ett mer robust system för att skydda katalogtjänsten mot att behörighetsprinciperna bryts och ger obehörig personal ell
APA, Harvard, Vancouver, ISO, and other styles
8

Stefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.

Full text
Abstract:
Given the continuing advancement of networking applications and our increased dependence upon software-based systems, there is a pressing need to develop improved security techniques for defending modern information technology (IT) systems from malicious cyber-attacks. Indeed, anyone can be impacted by such activities, including individuals, corporations, and governments. Furthermore, the sustained expansion of the network user base and its associated set of applications is also introducing additional vulnerabilities which can lead to criminal breaches and loss of critical data. As a result, t
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Labbe, Keith G. "Evaluation of two host-based intrusion prevention systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FLabbe.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Intrusion Prevention System"

1

Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saxena, Manish. Next Generation Intelligent Network Intrusion Prevention System. Lulu Press, Inc., 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lammle, Todd, John Gay, and Alexis B. Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Intrusion Prevention System"

1

Wang, Zongjian, and Xiaobo Li. "Intrusion Prevention System Design." In Lecture Notes in Electrical Engineering. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4847-0_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "System Intrusion Detection and Prevention." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jin, Hai, Zhiling Yang, Jianhua Sun, Xuping Tu, and Zongfen Han. "CIPS: Coordinated Intrusion Prevention System." In Information Networking. Convergence in Broadband and Mobile Networking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Erete, Ikpeme. "Browser-Based Intrusion Prevention System." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "System Intrusion Detection and Prevention." In Texts in Computer Science. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thoma, Jan Philipp, Florian Stolz, and Tim Güneysu. "Cips: The Cache Intrusion Prevention System." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-70903-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ashoor, Asmaa Shaker, and Sharad Gore. "Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." In Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intrusion Prevention System"

1

Shitole, Ruturaj Ramchandra, Sai Kumar Nekkanti, and Timothy Wood. "Poster: eBPF-Based Intrusion Prevention System for Database Servers." In 2024 IEEE Cloud Summit. IEEE, 2024. http://dx.doi.org/10.1109/cloud-summit61220.2024.00031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

P, Sarumathy, Rajasree S, and Chandrasekar A. "An AI-Based Intrusion Prevention System to Enhance Cloud Security." In 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL). IEEE, 2025. https://doi.org/10.1109/icsadl65848.2025.10933485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ramachandran, Raji, Divya Gopan, and M. S. Harsha. "Intrusion Prevention System In RDBMS." In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vasudeo, Sarode Harshal, Pravin Patil, and R. Vinoth Kumar. "IMMIX-intrusion detection and prevention system." In 2015 International Conference on Smart Technologies and Management  for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE, 2015. http://dx.doi.org/10.1109/icstm.2015.7225396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mukhopadhyay, Indraneel, Kirit Sankar Gupta, Diptarshi Sen, and Piyali Gupta. "Heuristic Intrusion Detection and Prevention System." In 2015 International Conference and Workshop on Computing and Communication (IEMCON). IEEE, 2015. http://dx.doi.org/10.1109/iemcon.2015.7344479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulrezzak, Sarah, and Firas A. Sabir. "Enhancing Intrusion Prevention in Snort System." In 2023 15th International Conference on Developments in eSystems Engineering (DeSE). IEEE, 2023. http://dx.doi.org/10.1109/dese58274.2023.10099757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasad, Romesh, and Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.

Full text
Abstract:
Abstract While Cyber-Manufacturing System security must involve three separate yet interrelated processes (prediction, detection, and prevention), the detection process is the focus of research presented in this paper. Current intrusion detection systems often result in high false positive and false negative rates. Also, the actual detection time may take long time-up to several months. The current intrusion detection systems rely heavily on the network data, but do not utilize the physical data such as side channel, sensor reading, image, keystrokes., which are generated during manufacturing
APA, Harvard, Vancouver, ISO, and other styles
8

Lomotey, Richard K., and Ralph Deters. "Intrusion Prevention in Asterisk-Based Telephony System." In 2014 IEEE International Conference on Mobile Services (MS)  . IEEE, 2014. http://dx.doi.org/10.1109/mobserv.2014.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "The trends of Intrusion Prevention System network." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lih-Chyau Wuu, Yen-Hung Chen, Chih-Chieh Ma, and I-Tao Lung. "A practice of the intrusion prevention system." In TENCON 2007 - 2007 IEEE Region 10 Conference. IEEE, 2007. http://dx.doi.org/10.1109/tencon.2007.4428862.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Intrusion Prevention System"

1

Frish. PR-319-084511-R01 Advanced Development of Proactive Infrasonic Gas Pipeline Evaluation Network (PIGPEN). Pipeline Research Council International, Inc. (PRCI), 2014. http://dx.doi.org/10.55274/r0010816.

Full text
Abstract:
A third party damage prevention warning system must have the following important attributes; the ability to accurately detect excavating activity in dense, noisy and high traffic areas, low maintenance requirements, be relatively easy to install, provide 24/7 coverage, and exhibit a low rate of false alarms. Systems that detect and quickly notify of encroachment or insufficient practices near gas pipelines would enable pipeline operators to take actions to avoid damage incidents. Early warning provides pipeline owners the ability to respond to an intrusion in time to prevent pipeline damage, a
APA, Harvard, Vancouver, ISO, and other styles
2

Scarfone, K. A., and P. M. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!