Books on the topic 'Network Intrusion Prevention'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 33 books for your research on the topic 'Network Intrusion Prevention.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ghorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.
Full textInternational Business Machines Corporation. International Technical Support Organization, ed. Network intrusion prevention design guide. IBM, International Technical Support Organization, 2011.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.
Find full text1969-, Russell Ryan, Mullen Timothy M, and Pinzon Scott, eds. Stealing the network: How to own a shadow : the chase for Knuth. Syngress, 2007.
Find full textTrost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Addison-Wesley, 2009.
Find full textPeter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Find full textSaxena, Manish. Next Generation Intelligent Network Intrusion Prevention System. Lulu Press, Inc., 2017.
Find full textBennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.
Find full textLu, Wei, Ali A. A. Ghorbani, and Mahbod Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2012.
Find full textGhorbani, Ali A. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer, 2009.
Find full textOrebaugh, Angela, Graham Clark, and Michael Rash. Intrusion Prevention and Active Response: Deploying Network and Host IPS. Elsevier Science & Technology Books, 2005.
Find full textIntrusion Prevention and Active Response: Deploying Network and Host IPS. Syngress, 2005.
Find full textRussell, Ryan, Tim Mullen, and Johnny Long. Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network). Syngress, 2007.
Find full textCarter, Earl, and Jonathan Hogue. Intrusion Prevention Fundamentals. Pearson Education, Limited, 2011.
Find full textCraig, Tom, Ryan Russell, and Joe Grand. Stealing the Network: How to Own a Continent. Elsevier Science & Technology Books, 2004.
Find full textHurley, Chris, Ryan Russell, Jay Beale, Riley Eller, and Tom Parker. Stealing the Network: How to Own an Identity. Elsevier Science & Technology Books, 2005.
Find full textRussell, Ryan, Johnny Long, and Timothy Mullen. Stealing the Network: How to Own a Shadow. Elsevier Science & Technology Books, 2011.
Find full textRussell, Ryan, Johnny Long, and Timothy Mullen. Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD. Elsevier Science & Technology Books, 2009.
Find full textAdvanced Host Intrusion Prevention with CSA (Networking Technology). Cisco Press, 2006.
Find full textPathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Taylor & Francis Group, 2016.
Find full textPathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Auerbach Publishers, Incorporated, 2014.
Find full textPathan, Al-Sakib Khan. State of the Art in Intrusion Prevention and Detection. Taylor & Francis Group, 2014.
Find full textLammle, Todd, John Gay, and Alexis B. Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textThe state of the art in intrusion prevention and detection. CRC Press/Taylor & Francis Group, 2014.
Find full textBaker, Andrew, Jay Beale, and Brian Caswell. Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security). Syngress Publishing, 2007.
Find full textLammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textLammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textBuchanan, Ben. The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System. Hurst And Company Macmillan UK, 2016.
Find full textHarris, Mason, Vivek Santuka, Aaron Woland, and Jamie Sanbower. Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security. Pearson Education, Limited, 2018.
Find full textHarris, Mason, Vivek Santuka, Aaron Woland, and Jamie Sanbower. Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security. Pearson Education, Limited, 2018.
Find full textRajib, Nazmul. Cisco Firepower Threat Defense (FTD): Configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP). 2018.
Find full textSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full text