Intrusion detection networks : a key to collaborative security /

Saved in:
Bibliographic Details
Author / Creator:Fung, Carol, author.
Imprint:Boca Raton : CRC Press, Taylor & Francis Group, [2014]
©20
©2014
Description:1 online resource (xxii, 239 pages) : illustrations
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13617548
Hidden Bibliographic Details
Other authors / contributors:Boutaba, Raouf, author.
ISBN:9781466564138
146656413X
9781466564121
1466564121
Notes:"An Auerbach book."
Includes bibliographical references and index.
Print version record.
Summary:The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, i.
Other form:Print version: Fung, Carol. Intrusion detection networks. Boca Raton : CRC Press, [2014] 9781466564121

MARC

LEADER 00000cam a2200000 i 4500
001 13617548
006 m o d
007 cr mn|||||||||
008 131211t20142014flua ob 001 0 eng d
005 20241126150808.3
015 |a GBB7A1418  |2 bnb 
016 7 |a 018373226  |2 Uk 
019 |a 865330486  |a 900646085 
020 |a 9781466564138  |q (eBook - PDF) 
020 |a 146656413X  |q (eBook - PDF) 
020 |z 9781466564121  |q (hardcover ;  |q alk. paper) 
020 |z 1466564121  |q (hardcover ;  |q alk. paper) 
035 9 |a (OCLCCM-CC)865006746 
035 |a (OCoLC)865006746  |z (OCoLC)865330486  |z (OCoLC)900646085 
037 |a CL0500000534  |b Safari Books Online 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d E7B  |d STF  |d VLB  |d OSU  |d CRCPR  |d OCLCQ  |d OCLCF  |d COO  |d UMI  |d DEBBG  |d EBLCP  |d DEBSZ  |d OCLCQ  |d GGVRL  |d UAB  |d OTZ  |d SAV  |d OCLCQ  |d OCLCA  |d OCLCQ  |d LND  |d CEF  |d OCLCQ  |d U3W  |d NLE  |d OCLCQ  |d UKMGB  |d YDX  |d TYFRS  |d LEAUB  |d OCLCQ  |d UKAHL  |d NLW  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d SFB  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
049 |a MAIN 
050 4 |a QA76.9.A25  |b F85 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
100 1 |a Fung, Carol,  |e author.  |0 http://id.loc.gov/authorities/names/n2013061371 
245 1 0 |a Intrusion detection networks :  |b a key to collaborative security /  |c Carol Fung and Raouf Boutaba. 
264 1 |a Boca Raton :  |b CRC Press, Taylor & Francis Group,  |c [2014] 
264 4 |c ©20 
264 4 |c ©2014 
300 |a 1 online resource (xxii, 239 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
505 0 |a Cyber intrusions and intrusion detection -- Design of an intrusion detection network -- Other types of IDN design. 
588 0 |a Print version record. 
520 |a The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, i. 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh85029553 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 2 |a Computer Security  |0 https://id.nlm.nih.gov/mesh/D016494 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Boutaba, Raouf,  |e author.  |0 http://id.loc.gov/authorities/names/nb98022753 
758 |i has work:  |a Intrusion detection networks (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGyv8T7jJhmhPdM8CTJ6Bq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Fung, Carol.  |t Intrusion detection networks.  |d Boca Raton : CRC Press, [2014]  |z 9781466564121  |w (DLC) 2013039508  |w (OCoLC)793224635 
856 4 0 |u https://go.oreilly.com/uchicago/library/view/-/9781466564121/?ar  |y O'Reilly 
929 |a oclccm 
999 f f |s a882b9cf-5bf3-4353-afe5-b0c6fefd3a9c  |i 43e23ff3-7c68-4d85-aa7e-c3ba60d3605b 
928 |t Library of Congress classification  |a QA76.9.A25F85 2014eb  |l Online  |c UC-FullText  |u https://go.oreilly.com/uchicago/library/view/-/9781466564121/?ar  |z O'Reilly  |g ebooks  |i 13760488