To see the other types of publications on this topic, follow the link: Network intrusion detection system.

Books on the topic 'Network intrusion detection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Network intrusion detection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. Springer New York, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ning, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Implementing intrusion detection systems: A hands-on guide for securing the network. Wiley Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stephen, Northcutt, and Edmead Mark T, eds. Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. New Riders, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Network anomaly detection: A machine learning perspective. CRC Press, Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Judy, Novak, ed. Network intrusion detection. 3rd ed. New Riders Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Springer-Verlag US, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ghorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

C, Foster James, ed. Snort 2.0 intrusion detection. Syngress, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Kwangjo, Muhamad Erza Aminanto, and Harry Chandra Tanuwidjaja. Network Intrusion Detection using Deep Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1444-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Marchette, David J. Computer Intrusion Detection and Network Monitoring. Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Network intrusion detection: An analyst's handbook. New Riders, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Judy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. New Riders, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Manu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Thomson Course Technology PTR, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Escamilla, Terry. Intrusion detection: Network security beyond the firewall. John Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

The Tao of network security monitoring: Beyond intrusion detection. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Herrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Whitman, Michael E. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Cengage Delmar Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Greg, Holden, ed. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Cengage Delmar Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Statistical techniques for network security: Modern statistically-based intrusion detection and protection. Information Science Reference, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Real world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Prentice Hall, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Intrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

V, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2006: 17-18 April 2006, Kissimmee, Florida, USA. SPIE, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

V, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. SPIE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Peter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

V, Dasarathy Belur, Society of Photo-optical Instrumentation Engineers., and Ball Aerospace & Technologies Corporation (USA), eds. Data mining, intrusion detection, information assurance, and data networks security 2005: 28-29 March, 2005, Orlando, Florida, USA. SPIE, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dasarathy, Belur V. Data mining, intrusion detection, information security and assurance, and data networks security 2009: 15-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

1945-, Mohay George M., ed. Computer and intrusion forensics. Artech House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Davide, Balzarotti, Maier Gregor, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Somesh, Jha, Balzarotti Davide, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Holz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Network Security: Distributed Approach in Intrusion Detection System. Vyusta Ventures LLP, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Carter, Earl. Cisco Secure Intrusion Detection System. Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Network Intrusion Analysis. Syngress Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Instant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Network Defense-in-Depth: Evaluating Host-Based Intrusion Detection Systems. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Crothers, Tim. Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Crothers, Tim. Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography