L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBN
Frais de port :
Gratuit
Vers Etats-Unis
Description du livre Soft Cover. Etat : new. N° de réf. du vendeur 9781441939067
Description du livre Etat : New. N° de réf. du vendeur ABLIING23Mar2411530295411
Description du livre Etat : New. N° de réf. du vendeur 15497253-n
Description du livre Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs. 168 pp. Englisch. N° de réf. du vendeur 9781441939067
Description du livre Etat : New. N° de réf. du vendeur 15497253-n
Description du livre Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Introduces the innovative idea of applying information visualization techniques to the intrusion detection problem by combining a simple anomaly-based log reduction scheme The resulting approach applies unique intrusion detection requests from a w. N° de réf. du vendeur 4174274
Description du livre Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Göteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the 'opponent' at Dr. Axelsson's examination. In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating its significance and contributions to the field and then to introduce the work to the attendees at the examination. This done, the candidate presents the technical details of the work and the opponent critiques the work giving the candidate the opportunity to defend it^. This forward is adapted from the introduction that I gave at the examination and should serve to acquaint the reader, not only with the work at hand, but also with the field to which it applies. The title of the work, 'Under standing Intrusion Detection Through Visualization,' is particularly telling. As is the case with any good piece of research, we hope to gain an understanding of a problem, not just a recipe or simple solution of immediate, but limited utility. For much of its formative period, computer security concentrated on devel oping systems that, in effect, embodied a fortress model of protection. N° de réf. du vendeur 9781441939067
Description du livre Paperback. Etat : Brand New. 145 pages. 9.25x6.25x0.38 inches. In Stock. N° de réf. du vendeur x-1441939067
Description du livre Etat : New. Series: Advances in Information Security. Num Pages: 165 pages, 34 black & white illustrations, 10 black & white tables, biography. BIC Classification: URY. Category: (P) Professional & Vocational. Dimension: 234 x 156 x 9. Weight in Grams: 266. . 2010. 1st ed. Softcover of orig. ed. 2006. Paperback. . . . . N° de réf. du vendeur V9781441939067
Description du livre Etat : New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. N° de réf. du vendeur ria9781441939067_lsuk