Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

4.11 - 1251 ratings - Source



Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.Computer networking: A top-down approach featuring the Internet, 5th edition. Upper Saddle River, NJ: Addison-Wesley. Larson, U.E. (2009). On adapting data collection to intrusion detection. PhD thesis, Chalmers University of Technology, GApteborg, Sweden. Larson, U.E., Lundin Barse, E., aamp; Jonsson, E. (2005). METAL: A tool for extracting attack manifestations. In Proceedings of the 2nd Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVAanbsp;...


Title:Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
Author: Kabiri, Peyman
Publisher:IGI Global - 2011-10-31
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA