Intrusion detection / Rebecca Gurley Bace.
Material type:
- 1578701856
- 9781578701858
- TK 5105.59 B117i 2000
Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
Biblioteca Juan Bosch | Biblioteca Juan Bosch | Colección de Tecnología | Humanidades (4to. Piso) | TK 5105.59 B117i 2000 (Browse shelf(Opens below)) | 1 | Available | 00000069418 |
Browsing Biblioteca Juan Bosch shelves, Shelving location: Humanidades (4to. Piso), Collection: Colección de Tecnología Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
No cover image available |
![]() |
No cover image available | ||
TK 5105.5 W627c 1997 Cyberspace : the human dimension / | TK 5105.543 E26i 2002 Interdomain multicast routing : practical Juniper Networks and Cisco systems solutions / | TK 5105.59 A772c 2015 La cybersécurité / | TK 5105.59 B117i 2000 Intrusion detection / | TK 5105.59 D286 2012 The debate on privacy and security over the network : regulation and markets / | TK 5105.59 P196c 2000 La criminalité sur l'lnternet / | TK 5105.59 P196c 2001 La criminalite sur l'internet / |
1 History of Intrusion Detection 7 --
4 Analysis Schemes 79 --
5 Responses 121 --
6 Vulnerability Analysis: A Special Case 135 --
7 Technical Issues 155 --
8 Understanding the Real-World Challenge 173 --
9 Legal Issues 195 --
10 For Users 217 --
11 For Strategists 235 --
12 For Designers 255 --
13 Future Needs 275 --
Appendix D Checklist 321.
Presenting real analysis schemes and responses as well as a detailed discussion of the vulnerabilities that exist in many systems and approaches to testing systems for these problems, this book is for courses in network security.
There are no comments on this title.