Books on the topic 'Network intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Network intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.
Find full textComputer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. Springer New York, 2001.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.
Find full textImplementing intrusion detection systems: A hands-on guide for securing the network. Wiley Pub., 2003.
Find full textStephen, Northcutt, and Edmead Mark T, eds. Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. New Riders, 2003.
Find full textNetwork anomaly detection: A machine learning perspective. CRC Press, Taylor & Francis Group, 2014.
Find full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Springer-Verlag US, 2008.
Find full textGhorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.
Full textKim, Kwangjo, Muhamad Erza Aminanto, and Harry Chandra Tanuwidjaja. Network Intrusion Detection using Deep Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1444-5.
Full textMarchette, David J. Computer Intrusion Detection and Network Monitoring. Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4.
Full textJudy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. New Riders, 2001.
Find full textManu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Thomson Course Technology PTR, 2008.
Find full textEscamilla, Terry. Intrusion detection: Network security beyond the firewall. John Wiley, 1998.
Find full textTsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textThe Tao of network security monitoring: Beyond intrusion detection. Addison-Wesley, 2005.
Find full textSushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Kluwer Academic Publishers, 2004.
Find full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer Berlin Heidelberg, 2011.
Find full textWhitman, Michael E. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Cengage Delmar Learning, 2009.
Find full textGreg, Holden, ed. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Cengage Delmar Learning, 2009.
Find full textStatistical techniques for network security: Modern statistically-based intrusion detection and protection. Information Science Reference, 2008.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textIntrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall PTR, 2003.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2006: 17-18 April 2006, Kissimmee, Florida, USA. SPIE, 2006.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. SPIE, 2007.
Find full textPeter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Find full textV, Dasarathy Belur, Society of Photo-optical Instrumentation Engineers., and Ball Aerospace & Technologies Corporation (USA), eds. Data mining, intrusion detection, information assurance, and data networks security 2005: 28-29 March, 2005, Orlando, Florida, USA. SPIE, 2005.
Find full textDasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). SPIE, 2009.
Find full textDasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). SPIE, 2009.
Find full textDavide, Balzarotti, Maier Gregor, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textSomesh, Jha, Balzarotti Davide, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Springer Berlin Heidelberg, 2009.
Find full textHolz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textNetwork Security: Distributed Approach in Intrusion Detection System. Vyusta Ventures LLP, 2022.
Find full textBennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.
Find full textLhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textInstant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textNetwork Defense-in-Depth: Evaluating Host-Based Intrusion Detection Systems. Storming Media, 2001.
Find full textCrothers, Tim. Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Wiley, 2002.
Find full textCrothers, Tim. Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Wiley & Sons, Incorporated, John, 2008.
Find full textUsing a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.
Find full textZeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.
Find full textCCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.
Find full textInside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Pearson Education, 2005.
Find full text