Related Books
Language: en
Pages: 29
Pages: 29
Type: BOOK - Published: - Publisher: NOITE S.C.
Tracking modification of files with AIDE or Tripwire is one of the main methods of protecting the system. The micro-course describes popular Host IDS systems, t
Language: en
Pages: 311
Pages: 311
Type: BOOK - Published: 2020-02-10 - Publisher: John Wiley & Sons
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers
Language: en
Pages: 339
Pages: 339
Type: BOOK - Published: 2013-04-17 - Publisher: Springer Science & Business Media
This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these p
Language: en
Pages: 280
Pages: 280
Type: BOOK - Published: 2016-03-28 - Publisher: Springer
This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in
Language: en
Pages: 325
Pages: 325
Type: BOOK - Published: 2004-10-01 - Publisher: Springer
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 20