It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 06145cam 2200913Ia 4500
001 ocn272306846
003 OCoLC
005 20210924232103.0
008 081117s2008 nyua ob 001 0 eng d
006 m o d
007 cr cn|||||||||
040 $aGW5XE$beng$epn$cGW5XE$dWAU$dCEF$dN$T$dCDX$dEBLCP$dIDEBK$dOCLCQ$dOCLCO$dALAUL$dOCLCQ$dOCLCF$dDEBSZ$dBEDGE$dOCLCQ$dSLY$dNLGGC$dOCLCQ$dBUF$dAU@$dWYU$dOCLCQ$dICG$dYOU$dCANPU$dAUD$dOCLCQ$dZHM$dERF$dOCLCQ$dLQU$dOCLCQ
019 $a312122714$a316002755$a317883332$a488907453$a880103518$a1044266975$a1044296778$a1056337306$a1056374970$a1058730926$a1060690534$a1060694819$a1060808770$a1060866005$a1066581134$a1074328364$a1078032904$a1078038047$a1087472078$a1100828531$a1110884101$a1110948581$a1112582672$a1127922665$a1134827655$a1135372721
020 $a9780387772660
020 $a0387772669
020 $a6611491759$q(electronic bk.)
020 $a9786611491758$q(electronic bk.)
020 $a9780387772653
020 $a0387772650
020 $z0387772650$q(Cloth)
024 7 $a10.1007/978-0-387-77265-3$2doi
024 8 $a10.1007/978-0-387-77
035 $a(OCoLC)272306846$z(OCoLC)312122714$z(OCoLC)316002755$z(OCoLC)317883332$z(OCoLC)488907453$z(OCoLC)880103518$z(OCoLC)1044266975$z(OCoLC)1044296778$z(OCoLC)1056337306$z(OCoLC)1056374970$z(OCoLC)1058730926$z(OCoLC)1060690534$z(OCoLC)1060694819$z(OCoLC)1060808770$z(OCoLC)1060866005$z(OCoLC)1066581134$z(OCoLC)1074328364$z(OCoLC)1078032904$z(OCoLC)1078038047$z(OCoLC)1087472078$z(OCoLC)1100828531$z(OCoLC)1110884101$z(OCoLC)1110948581$z(OCoLC)1112582672$z(OCoLC)1127922665$z(OCoLC)1134827655$z(OCoLC)1135372721
037 $a978-0-387-77265-3$bSpringer$nhttp://www.springerlink.com
050 4 $aQA76.9.A25$bI58 2008eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
072 7 $aURY$2bicssc
082 04 $a005.8$222
084 $aTP309$2clc
245 00 $aIntrusion detection systems /$cedited by Roberto Di Pietro and Luigi V. Mancini.
260 $aNew York :$bSpringer,$c©2008.
300 $a1 online resource (xiii, 249 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file
347 $bPDF
490 1 $aAdvances in information security ;$v38
504 $aIncludes bibliographical references and index.
505 0 $aApproaches in anomaly-based network intrusion detection systems / Damiano Bolzoni and Sandro Etalle -- Formal specification for fast automatic profiling of program behavior / Roberto Di Pietro, Antonio Durante and Luigi. V. Mancini -- Learning behavior profiles from noisy sequences / Ugo Galassi -- Correlation analysis of intrusion alerts / Dingbang Xu and Peng Ning -- An approach to preventing, correlating and predicting multi-step network attacks / Lingyu Wang and Sushil Jajodia -- Response : bridging the link between intrusion detection alerts and security policies / Hervé Debar [and others] -- Intrusion detection and reaction : an integrated approach to network security / M. Esposito [and others].
520 $aTo defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. -- Publisher description.
588 0 $aPrint version record.
546 $aEnglish.
650 0 $aIntrusion detection systems (Computer security)
650 0 $aComputer science.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 07 $aComputers$xAccess control.$2cct
650 7 $aInformatique.$2eclas
650 7 $aComputer science.$2fast$0(OCoLC)fst00872451
650 7 $aIntrusion detection systems (Computer security)$2fast$0(OCoLC)fst01762593
655 4 $aElectronic books.
700 1 $aDi Pietro, Roberto.
700 1 $aMancini, Luigi V.
776 08 $iPrint version:$tIntrusion detection systems.$dNew York : Springer, ©2008$z9780387772653$z0387772650$w(OCoLC)191243194
830 0 $aAdvances in information security ;$v38.
856 40 $3EBSCOhost$uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=254946
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=149175
856 40 $3ProQuest Ebook Central$uhttps://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=372102
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks0/springer/2009-12-01/3/9780387772660
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks0/springer/2010-02-11/1/9780387772660
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-0-387-77265-3
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007%2F978-0-387-77265-3
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-0-387-77265-3
856 4 $uhttps://discover.gcu.ac.uk/discovery/openurl?institution=44GLCU_INST&vid=44GLCU_INST:44GLCU_VU2&?u.ignore_date_coverage=true&rft.mms_id=991002481689703836$p5369852090003836$xStGlGCU
938 $aCoutts Information Services$bCOUT$n8740904
938 $aProQuest Ebook Central$bEBLB$nEBL372102
938 $aEBSCOhost$bEBSC$n254946
938 $aProQuest MyiLibrary Digital eBook Collection$bIDEB$n149175
029 1 $aCDX$b8740904
029 1 $aDEBSZ$b396214851
029 1 $aDEBSZ$b430683448
029 1 $aNLGGC$b317383477
029 1 $aNZ1$b13072360
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 364 OTHER HOLDINGS