|
The State of the Art in Intrusion Prevention and Detection
|
(Buch) |
Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!
Lieferstatus: |
i.d.R. innert 7-14 Tagen versandfertig |
Veröffentlichung: |
November 2016
|
Genre: |
EDV / Informatik |
ISBN: |
9781138033986 |
EAN-Code:
|
9781138033986 |
Verlag: |
Auerbach Publications |
Einband: |
Kartoniert |
Sprache: |
English
|
Dimensionen: |
H 254 mm / B 178 mm / D 28 mm |
Gewicht: |
960 gr |
Seiten: |
516 |
Zus. Info: |
Paperback |
Bewertung: |
Titel bewerten / Meinung schreiben
|
Inhalt: |
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.
Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.
The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.
The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security. |
|