|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn865006746 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
131211t20142014flua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d YDXCP
|d E7B
|d STF
|d VLB
|d OSU
|d CRCPR
|d OCLCQ
|d OCLCF
|d COO
|d UMI
|d DEBBG
|d EBLCP
|d DEBSZ
|d OCLCQ
|d GGVRL
|d UAB
|d OTZ
|d SAV
|d OCLCQ
|d OCLCA
|d OCLCQ
|d LND
|d CEF
|d OCLCQ
|d U3W
|d NLE
|d OCLCQ
|d UKMGB
|d YDX
|d TYFRS
|d LEAUB
|d OCLCQ
|d UKAHL
|d NLW
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d SFB
|d INARC
|d OCLCQ
|
015 |
|
|
|a GBB7A1418
|2 bnb
|
016 |
7 |
|
|a 018373226
|2 Uk
|
019 |
|
|
|a 865330486
|a 900646085
|
020 |
|
|
|a 9781466564138
|q (eBook - PDF)
|
020 |
|
|
|a 146656413X
|q (eBook - PDF)
|
020 |
|
|
|z 9781466564121
|q (hardcover ;
|q alk. paper)
|
020 |
|
|
|z 1466564121
|q (hardcover ;
|q alk. paper)
|
029 |
1 |
|
|a AU@
|b 000055937132
|
029 |
1 |
|
|a AU@
|b 000062349653
|
029 |
1 |
|
|a CHNEW
|b 000634678
|
029 |
1 |
|
|a CHNEW
|b 000899102
|
029 |
1 |
|
|a DEBBG
|b BV042490827
|
029 |
1 |
|
|a DEBSZ
|b 431544689
|
029 |
1 |
|
|a DEBSZ
|b 434840068
|
029 |
1 |
|
|a DEBSZ
|b 463014804
|
029 |
1 |
|
|a GBVCP
|b 882740423
|
029 |
1 |
|
|a UKMGB
|b 018373226
|
029 |
1 |
|
|a AU@
|b 000068988662
|
035 |
|
|
|a (OCoLC)865006746
|z (OCoLC)865330486
|z (OCoLC)900646085
|
037 |
|
|
|a CL0500000534
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b F85 2014eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Fung, Carol,
|e author.
|
245 |
1 |
0 |
|a Intrusion detection networks :
|b a key to collaborative security /
|c Carol Fung and Raouf Boutaba.
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press, Taylor & Francis Group,
|c [2014]
|
264 |
|
4 |
|c ©20
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource (xxii, 239 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a "An Auerbach book."
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cyber intrusions and intrusion detection -- Design of an intrusion detection network -- Other types of IDN design.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, i.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
700 |
1 |
|
|a Boutaba, Raouf,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Fung, Carol.
|t Intrusion detection networks.
|d Boca Raton : CRC Press, [2014]
|z 9781466564121
|w (DLC) 2013039508
|w (OCoLC)793224635
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781466564121/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n intrusiondetecti0000fung
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25300606
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1492900
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10811763
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 668805
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8PZY
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429099922
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n AUP0KE20838PDF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15917630
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10883793
|
994 |
|
|
|a 92
|b IZTAP
|