Distributed Intrusion (Paperback)


All computer security breaches cannot be prevented using access control Mechanism and information flow control technique. These breaches may be due to System software flaws, improper system administration procedures or failure of the Authentication module. Intrusion detection can play an important role in this type of Breaches. This book concentrates on intrusion detection as a second line of Defense after the access control mechanism in the system. This book provides an Solution to the given problem: Can we usefully and effectively detect site security Violations happening in the system when the access controls mechanisms fail? A More descriptive form statement is: An intruder may get access to the system by overcoming the access control mechanisms under certain circumstances. Therefore, important events occurring in the network that are of interest to the security are logged in the system. These logs can be analyzed to infer any site security violations that could have happened in the network with architecture of De- centralized Distribution Intrusion Detection system.

R1,302

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles13020
Mobicred@R122pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Donate to Against Period Poverty


Product Description

All computer security breaches cannot be prevented using access control Mechanism and information flow control technique. These breaches may be due to System software flaws, improper system administration procedures or failure of the Authentication module. Intrusion detection can play an important role in this type of Breaches. This book concentrates on intrusion detection as a second line of Defense after the access control mechanism in the system. This book provides an Solution to the given problem: Can we usefully and effectively detect site security Violations happening in the system when the access controls mechanisms fail? A More descriptive form statement is: An intruder may get access to the system by overcoming the access control mechanisms under certain circumstances. Therefore, important events occurring in the network that are of interest to the security are logged in the system. These logs can be analyzed to infer any site security violations that could have happened in the network with architecture of De- centralized Distribution Intrusion Detection system.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

VDM Verlag

Country of origin

Germany

Release date

March 2010

Availability

Expected to ship within 10 - 15 working days

First published

March 2010

Authors

Dimensions

229 x 152 x 4mm (L x W x T)

Format

Paperback - Trade

Pages

68

ISBN-13

978-3-639-24182-2

Barcode

9783639241822

Categories

LSN

3-639-24182-7



Trending On Loot