To see the other types of publications on this topic, follow the link: Network Intrusion Prevention.

Books on the topic 'Network Intrusion Prevention'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 books for your research on the topic 'Network Intrusion Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Ghorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

International Business Machines Corporation. International Technical Support Organization, ed. Network intrusion prevention design guide. IBM, International Technical Support Organization, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1969-, Russell Ryan, Mullen Timothy M, and Pinzon Scott, eds. Stealing the network: How to own a shadow : the chase for Knuth. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saxena, Manish. Next Generation Intelligent Network Intrusion Prevention System. Lulu Press, Inc., 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Wei, Ali A. A. Ghorbani, and Mahbod Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghorbani, Ali A. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Orebaugh, Angela, Graham Clark, and Michael Rash. Intrusion Prevention and Active Response: Deploying Network and Host IPS. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Intrusion Prevention and Active Response: Deploying Network and Host IPS. Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Russell, Ryan, Tim Mullen, and Johnny Long. Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network). Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Carter, Earl, and Jonathan Hogue. Intrusion Prevention Fundamentals. Pearson Education, Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Craig, Tom, Ryan Russell, and Joe Grand. Stealing the Network: How to Own a Continent. Elsevier Science & Technology Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hurley, Chris, Ryan Russell, Jay Beale, Riley Eller, and Tom Parker. Stealing the Network: How to Own an Identity. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Russell, Ryan, Johnny Long, and Timothy Mullen. Stealing the Network: How to Own a Shadow. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Russell, Ryan, Johnny Long, and Timothy Mullen. Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD. Elsevier Science & Technology Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Advanced Host Intrusion Prevention with CSA (Networking Technology). Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Pathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Auerbach Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lammle, Todd, John Gay, and Alexis B. Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

The state of the art in intrusion prevention and detection. CRC Press/Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Baker, Andrew, Jay Beale, and Brian Caswell. Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security). Syngress Publishing, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Buchanan, Ben. The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System. Hurst And Company Macmillan UK, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Harris, Mason, Vivek Santuka, Aaron Woland, and Jamie Sanbower. Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Harris, Mason, Vivek Santuka, Aaron Woland, and Jamie Sanbower. Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rajib, Nazmul. Cisco Firepower Threat Defense (FTD): Configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP). 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Springer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.

Full text
Abstract:
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat—from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of Ch
APA, Harvard, Vancouver, ISO, and other styles
33

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!