Explore: Intrusion Detection Systems (computer Security)
Discover books, insights, and more — all in one place.
Learn more about Intrusion Detection Systems (computer Security) with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “intrusion-detection-systems-%28computer-security%29”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Snort 2.0 intrusion detection
By Jay Beale

“Snort 2.0 intrusion detection” Metadata:
- Title: Snort 2.0 intrusion detection
- Author: Jay Beale
- Language: English
- Number of Pages: Median: 523
- Publisher: Syngress - Elsevier Science
- Publish Date: 2003
- Publish Location: Oxford - Rockland, Mass
“Snort 2.0 intrusion detection” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL24981052M
- Online Computer Library Center (OCLC) ID: 52274199
- All ISBNs: 1931836744 - 9781931836746
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Snort 2.0 intrusion detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Intrusion Detection and Prevention for Mobile Ecosystems
By Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias and Dimitrios Damopoulos
“Intrusion Detection and Prevention for Mobile Ecosystems” Metadata:
- Title: ➤ Intrusion Detection and Prevention for Mobile Ecosystems
- Authors: Georgios KambourakisAsaf ShabtaiConstantinos KoliasDimitrios Damopoulos
- Language: English
- Number of Pages: Median: 544
- Publisher: Taylor & Francis Group
- Publish Date: 2017 - 2020
“Intrusion Detection and Prevention for Mobile Ecosystems” Subjects and Themes:
- Subjects: ➤ Mobile communication systems - Computer security - Security measures - Intrusion detection systems (Computer security) - COMPUTERS - Internet - General - TECHNOLOGY & ENGINEERING - Telecommunications
Edition Identifiers:
- The Open Library ID: ➤ OL34677916M - OL33677491M - OL33583992M - OL33693497M - OL33709092M - OL28862719M
- Online Computer Library Center (OCLC) ID: 994609954
- All ISBNs: ➤ 1315305801 - 9781138033573 - 1315305836 - 9781315305813 - 9781315305837 - 9780367573065 - 131530581X - 1315305828 - 9781315305806 - 9781315305820 - 113803357X - 0367573067
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Intrusion Detection and Prevention for Mobile Ecosystems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Botnets
By Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng and Peng Zhou
“Botnets” Metadata:
- Title: Botnets
- Authors: Georgios KambourakisMarios AnagnostopoulosWeizhi MengPeng Zhou
- Language: English
- Number of Pages: Median: 426
- Publisher: Taylor & Francis Group
- Publish Date: 2019 - 2022
“Botnets” Subjects and Themes:
- Subjects: ➤ Mobile communication systems - Security measures - Intrusion detection systems (Computer security) - COMPUTERS - Information Technology - Networking - General - Security
Edition Identifiers:
- The Open Library ID: ➤ OL33774619M - OL33742175M - OL33694973M - OL39550213M - OL33726945M - OL33679195M
- Online Computer Library Center (OCLC) ID: 1121596743
- All ISBNs: ➤ 9781000649932 - 1000649938 - 9781000644951 - 0367191547 - 0429329911 - 1032401133 - 9780429329913 - 1000644952 - 9781032401133 - 9780367191542 - 9781000639971 - 1000639975
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Botnets at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Intrusion Detection Systems
By Luigi V. Mancini

“Intrusion Detection Systems” Metadata:
- Title: Intrusion Detection Systems
- Author: Luigi V. Mancini
- Language: English
- Number of Pages: Median: 264
- Publisher: Springer-Verlag US - Springer
- Publish Date: 2008 - 2010
- Publish Location: Boston, MA
“Intrusion Detection Systems” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Intrusion detection systems (Computer security) - Computer science - COMPUTERS - Internet - Security - Networking - General - Computers - Access control - Informatique - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL28012610M - OL25538441M
- Online Computer Library Center (OCLC) ID: 191243194
- All ISBNs: ➤ 0387772669 - 9780387772653 - 1441945857 - 9780387772660 - 0387772650 - 9781441945853
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intrusion Detection Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Detection of Intrusions and Malware, and Vulnerability Assessment
By Sven Dietrich
“Detection of Intrusions and Malware, and Vulnerability Assessment” Metadata:
- Title: ➤ Detection of Intrusions and Malware, and Vulnerability Assessment
- Author: Sven Dietrich
- Language: English
- Publisher: ➤ Springer London, Limited - Springer International Publishing AG
- Publish Date: 2014
“Detection of Intrusions and Malware, and Vulnerability Assessment” Subjects and Themes:
- Subjects: ➤ Computer networks - Data protection - Data encryption (computer science) - Intrusion detection systems (Computer security) - Congresses - Computer security - Malware (Computer software) - Computer science - Information Systems - Systems and Data Security - E-Commerce/e-business - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL36207189M - OL36214967M
- All ISBNs: 3319085093 - 3319085085 - 9783319085081 - 9783319085098
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Detection of Intrusions and Malware, and Vulnerability Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Recent Advances in Intrusion Detection
By Alfonso Valdes and Diego Zamboni

“Recent Advances in Intrusion Detection” Metadata:
- Title: ➤ Recent Advances in Intrusion Detection
- Authors: Alfonso ValdesDiego Zamboni
- Language: English
- Number of Pages: Median: 351
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2004 - 2006
“Recent Advances in Intrusion Detection” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computers, access control - Congresses - Computers - Access control - Intrusion detection systems (Computer security)
Edition Identifiers:
- The Open Library ID: OL37121889M - OL37099405M - OL9321696M
- Online Computer Library Center (OCLC) ID: 64450614
- All ISBNs: ➤ 3540397256 - 9783540301431 - 3540301437 - 3540317783 - 9783540317784 - 9783540397250
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recent Advances in Intrusion Detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks
By Shibo He, Jiming Chen, Junkun Li and Youxian Sun

“Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks” Metadata:
- Title: ➤ Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks
- Authors: Shibo HeJiming ChenJunkun LiYouxian Sun
- Language: English
- Number of Pages: Median: 97
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014
“Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks” Subjects and Themes:
- Subjects: ➤ Sensor networks - Computer security - Intrusion detection systems (Computer security) - TECHNOLOGY & ENGINEERING - Technical & Manufacturing Industries & Trades - Computer science - Computer Communication Networks - Telecommunication - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL28740835M - OL36210823M
- Online Computer Library Center (OCLC) ID: 871177801
- All ISBNs: 9783319046488 - 3319046489 - 9783319046471 - 3319046470
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Network Intrusion Analysis
By Steven Bolt

“Network Intrusion Analysis” Metadata:
- Title: Network Intrusion Analysis
- Author: Steven Bolt
- Publisher: Syngress Publishing
- Publish Date: 2012
“Network Intrusion Analysis” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Intrusion detection systems (Computer security) - Investigation - Internet - Security measures - Computer crimes
Edition Identifiers:
- The Open Library ID: OL26147907M
- Online Computer Library Center (OCLC) ID: 842426557
- Library of Congress Control Number (LCCN): 2012041535
- All ISBNs: 9781597499620 - 1597499625
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Network Intrusion Analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Recent Advances in Intrusion Detection Lecture Notes in Computer Science Security and Cryptology
By Robin Sommer

“Recent Advances in Intrusion Detection Lecture Notes in Computer Science Security and Cryptology” Metadata:
- Title: ➤ Recent Advances in Intrusion Detection Lecture Notes in Computer Science Security and Cryptology
- Author: Robin Sommer
- Publisher: Springer
- Publish Date: 2011
“Recent Advances in Intrusion Detection Lecture Notes in Computer Science Security and Cryptology” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Malware (Computer software) - Intrusion detection systems (Computer security) - Congresses - Cryptography
Edition Identifiers:
- The Open Library ID: OL26141284M
- Library of Congress Control Number (LCCN): 2011935250
- All ISBNs: 9783642236433 - 364223643X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Recent Advances in Intrusion Detection Lecture Notes in Computer Science Security and Cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Intrusion detection systems with Snort
By Rafeeq Ur Rehman

“Intrusion detection systems with Snort” Metadata:
- Title: ➤ Intrusion detection systems with Snort
- Author: Rafeeq Ur Rehman
- Language: English
- Number of Pages: Median: 263
- Publisher: Prentice Hall PTR
- Publish Date: 2003
- Publish Location: Upper Saddle River, N.J
“Intrusion detection systems with Snort” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Security measures - Intrusion detection systems (Computer security) - Snort (Software) - Computer networks--security measures - Computers--access control - Tk5105.59 .r44 2003 - 005.8
Edition Identifiers:
- The Open Library ID: OL3708651M
- Online Computer Library Center (OCLC) ID: 52996780
- Library of Congress Control Number (LCCN): 2003284354
- All ISBNs: 9780131407336 - 0131407333
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Intrusion detection systems with Snort at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Understanding intrusion detection through visualization
By Stefan Axelsson and David Sands

“Understanding intrusion detection through visualization” Metadata:
- Title: ➤ Understanding intrusion detection through visualization
- Authors: Stefan AxelssonDavid Sands
- Language: English
- Number of Pages: Median: 157
- Publisher: Springer
- Publish Date: 2005 - 2010
“Understanding intrusion detection through visualization” Subjects and Themes:
- Subjects: ➤ Computer networks - Information visualization - Security measures - Computer security - Intrusion detection systems (Computer security) - Systèmes informatiques - Sécurité - Mesures - Antiprogrammes (Informatique) - Cyberterrorisme - Sécurité informatique - Fausses alarmes - COMPUTERS - Internet - Security - Networking - General - Informatique - Computer networks, security measures - Information science - Computer science - Computer Communication Networks - Data structures (Computer science) - Data encryption (Computer science) - Computer vision - Optical pattern recognition - Data Encryption - Computer Imaging, Vision, Pattern Recognition and Graphics - Pattern Recognition - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL28161592M - OL7445005M
- Online Computer Library Center (OCLC) ID: 62132599
- Library of Congress Control Number (LCCN): 2005933712
- All ISBNs: 9780387276342 - 1441939067 - 9781441939067 - 0387276343
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding intrusion detection through visualization at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12An overview of issues in testing intrusion detection systems
By Peter Mell
“An overview of issues in testing intrusion detection systems” Metadata:
- Title: ➤ An overview of issues in testing intrusion detection systems
- Author: Peter Mell
- Language: English
- Number of Pages: Median: 21
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology
- Publish Date: 2003
- Publish Location: Gaithersburg, Md
“An overview of issues in testing intrusion detection systems” Subjects and Themes:
- Subjects: ➤ Intrusion detection systems (Computer security) - Government policy
- Places: United States
Edition Identifiers:
- The Open Library ID: OL43927494M
- Online Computer Library Center (OCLC) ID: 747110783
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find An overview of issues in testing intrusion detection systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Network anomaly detection
By Dhruba K. Bhattacharyya
“Network anomaly detection” Metadata:
- Title: Network anomaly detection
- Author: Dhruba K. Bhattacharyya
- Language: English
- Number of Pages: Median: 340
- Publisher: ➤ CRC Press, Taylor & Francis Group
- Publish Date: 2014
- Publish Location: Boca Raton
“Network anomaly detection” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Intrusion detection systems (Computer security) - Machine learning - COMPUTERS / Machine Theory - COMPUTERS / Security / General - COMPUTERS / Security / Cryptography - Computer networks, security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Systèmes de détection d'intrusion (Sécurité informatique) - Apprentissage automatique - COMPUTERS - Machine Theory - Security - General - Cryptography
Edition Identifiers:
- The Open Library ID: OL31139696M
- Online Computer Library Center (OCLC) ID: 856570433 - 860864632
- Library of Congress Control Number (LCCN): 2013014913
- All ISBNs: 1466582081 - 9781466582088
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Network anomaly detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Planning for the future of cyber attack attribution
By United States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation
“Planning for the future of cyber attack attribution” Metadata:
- Title: ➤ Planning for the future of cyber attack attribution
- Author: ➤ United States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation
- Language: English
- Number of Pages: Median: 140
- Publisher: ➤ For sale by the Supt. of Docs., U.S. G.P.O. - U.S. G.P.O.
- Publish Date: 2010
- Publish Location: Washington
“Planning for the future of cyber attack attribution” Subjects and Themes:
- Subjects: ➤ Cyberterrorism - Intrusion detection systems (Computer security) - Computer security - Computer networks - Security measures - Right of Privacy - Prevention
- Places: United States
Edition Identifiers:
- The Open Library ID: OL24855772M
- Online Computer Library Center (OCLC) ID: 701833062 - 699777231
- Library of Congress Control Number (LCCN): 2011388539
- All ISBNs: 0160870739 - 9780160870736
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Planning for the future of cyber attack attribution at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Network intrusion detection and prevention
By Ali Ghorbani

“Network intrusion detection and prevention” Metadata:
- Title: ➤ Network intrusion detection and prevention
- Author: Ali Ghorbani
- Language: English
- Number of Pages: Median: 212
- Publisher: Springer
- Publish Date: 2010
- Publish Location: New York
“Network intrusion detection and prevention” Subjects and Themes:
- Subjects: ➤ Computer networks - Intrusion detection systems (Computer security) - Security measures - Case studies - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25155956M
- Online Computer Library Center (OCLC) ID: 473398208
- Library of Congress Control Number (LCCN): 2009934522
- All ISBNs: 9780387887708 - 0387887709 - 9780387887715 - 0387887717
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network intrusion detection and prevention at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Privacy-Respecting Intrusion Detection (Advances in Information Security)
By Ulrich Flegel

“Privacy-Respecting Intrusion Detection (Advances in Information Security)” Metadata:
- Title: ➤ Privacy-Respecting Intrusion Detection (Advances in Information Security)
- Author: Ulrich Flegel
- Language: English
- Number of Pages: Median: 307
- Publisher: Springer
- Publish Date: 2007
“Privacy-Respecting Intrusion Detection (Advances in Information Security)” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer network architectures - Coding theory - Data encryption (Computer science) - Data structures (Computer science) - Computer networks, security measures - Intrusion detection systems (Computer security) - Monitoring - Computer security - Computers - Access control - Computer Security - Systèmes de détection d'intrusion (Sécurité informatique) - Réseaux d'ordinateurs - Surveillance - Sécurité informatique - Ordinateurs - Accès - Contrôle - COMPUTERS - Internet - Security - Networking - General - Informatique
Edition Identifiers:
- The Open Library ID: OL10152798M
- Online Computer Library Center (OCLC) ID: 262687498
- All ISBNs: 9780387343464 - 0387343466
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy-Respecting Intrusion Detection (Advances in Information Security) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Snort 2.0 intrusion detection
By Jay Beale

“Snort 2.0 intrusion detection” Metadata:
- Title: Snort 2.0 intrusion detection
- Author: Jay Beale
- Language: English
- Number of Pages: Median: 523
- Publisher: Elsevier Science - Syngress
- Publish Date: 2003
- Publish Location: Oxford - Rockland, Mass
“Snort 2.0 intrusion detection” Subjects and Themes:
- Subjects: ➤ Intrusion detection systems (Computer security) - Snort (Software) - Computer security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24937544M
- Online Computer Library Center (OCLC) ID: 52274199
- All ISBNs: 1931836744 - 9781931836746
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Snort 2.0 intrusion detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Snort 2.0 Intrusion Detection
By James C. Foster

“Snort 2.0 Intrusion Detection” Metadata:
- Title: Snort 2.0 Intrusion Detection
- Author: James C. Foster
- Language: English
- Number of Pages: Median: 550
- Publisher: Syngress
- Publish Date: 2003
“Snort 2.0 Intrusion Detection” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL8805372M
- All ISBNs: 1931836744 - 9781931836746
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Snort 2.0 Intrusion Detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Snort 2.1 Intrusion Detection
By Jay Beale

“Snort 2.1 Intrusion Detection” Metadata:
- Title: Snort 2.1 Intrusion Detection
- Author: Jay Beale
- Language: English
- Number of Pages: Median: 751
- Publisher: Syngress
- Publish Date: 2004
“Snort 2.1 Intrusion Detection” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Intrusion detection systems (Computer security) - COMPUTERS - Internet - Security - Networking - General - Snort (Software) - Computer science - Professional, career & trade -> computer science -> computer science - Professional, career & trade -> computer science -> networking - Professional, career & trade -> computer science -> security
Edition Identifiers:
- The Open Library ID: OL8805337M
- Online Computer Library Center (OCLC) ID: 319430083
- All ISBNs: 9781931836043 - 1931836043
First Setence:
"It's three o'clock in the morning, and Andy Attacker is hard at work."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Snort 2.1 Intrusion Detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Recent advances in intrusion detection
By Herve Debar

“Recent advances in intrusion detection” Metadata:
- Title: ➤ Recent advances in intrusion detection
- Author: Herve Debar
- Language: English
- Number of Pages: Median: 225
- Publisher: Springer
- Publish Date: 2000
“Recent advances in intrusion detection” Subjects and Themes:
- Subjects: ➤ Computers - Congresses - Computer security - Access control - Computers, access control - Intrusion detection systems (Computer security) - Computer science - Computer networks - Operating systems (Computers) - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: OL12774508M
- Online Computer Library Center (OCLC) ID: 45023251
- Library of Congress Control Number (LCCN): 00047083
- All ISBNs: 3540410856 - 9783540410850
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recent advances in intrusion detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.