To see the other types of publications on this topic, follow the link: Intrusion Prevention System.

Books on the topic 'Intrusion Prevention System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 books for your research on the topic 'Intrusion Prevention System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saxena, Manish. Next Generation Intelligent Network Intrusion Prevention System. Lulu Press, Inc., 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lammle, Todd, John Gay, and Alexis B. Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rajib, Nazmul. Cisco Firepower Threat Defense: Configuration and Troubleshooting Best Practices for the Next-Generation Firewall , Next-Generation Intrusion Prevention System , and Advanced Malware Protection. Pearson Education, Limited, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rajib, Nazmul. Cisco Firepower Threat Defense: Configuration and Troubleshooting Best Practices for the Next-Generation Firewall , Next-Generation Intrusion Prevention System , and Advanced Malware Protection. Pearson Education, Limited, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Rajib, Nazmul. Cisco Firepower Threat Defense (FTD): Configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP). 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shabtai, Asaf, Georgios Kambourakis, Constantinos Kolias, and Dimitrios Damopoulos. Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shabtai, Asaf, Georgios Kambourakis, Constantinos Kolias, and Dimitrios Damopoulos. Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Shabtai, Asaf, Constantinos Kolias, Dimitrios Damopoulos, and George Kambourakis. Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shabtai, Asaf, Georgios Kambourakis, Constantinos Kolias, and Dimitrios Damopoulos. Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shabtai, Asaf, Georgios Kambourakis, Constantinos Kolias, and Dimitrios Damopoulos. Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Intrusion Detection and Prevention for Mobile Ecosystems. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Buchanan, Ben. The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System. Hurst And Company Macmillan UK, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Knechtel, Martin. Entwicklung und Implementierung Eines Intrusion-Detection und -Prevention Systems Zur Erkennung und Abwehr Von Gezielten Attacken und Anormalen Ereign. GRIN Verlag GmbH, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization.
APA, Harvard, Vancouver, ISO, and other styles
24

Trestman, Robert L., and Ashbel T. Wall. Supply Reduction in Prison. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780199374847.003.0015.

Full text
Abstract:
Interdiction of addictive substances is a challenge in all settings. Prisons are no exception. Given the high prevalence of addictive disorders among prisoner populations the demand for illicit substances is very high. This chapter reviews the ways in which correctional staff have approached this concern, including a substantial focus on preventing illicit substances from entering the facility in the first place. This effort requires a broad array of interventions, including monitoring phone calls and mail; structuring and overseeing the visitation process; using trained canines; and employing intrusive searches any time a prisoner leaves the facility and returns. These efforts interface with an ongoing process to monitor prison activities for drugs that get past screening efforts. Random drug testing, canine tours of the facility, and an intricate system of informants, are each an element of effective monitoring activities. This chapter reviews the effectiveness and cost-effectiveness of such interventions, and considers the consequences of failure. Given that such consequences may include staff corruption and the development or growth of a prison drug economy, effective interdiction is a priority in every well-run facility.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography