0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Donggang Liu, Peng Ning
R4,485 Discovery Miles 44 850 Ships in 10 - 15 working days

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.

Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September... Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Paperback, 2009 ed.)
Michael Backes, Peng Ning
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006,... Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (Paperback, 2006 ed.)
Peng Ning, Ninghui Li
R3,067 Discovery Miles 30 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.

Security for Wireless Sensor Networks (Hardcover, 2007 ed.): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Hardcover, 2007 ed.)
Donggang Liu, Peng Ning
R4,620 Discovery Miles 46 200 Ships in 10 - 15 working days

Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,654 Discovery Miles 16 540 Ships in 10 - 15 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Trustfall
Pink CD R254 R238 Discovery Miles 2 380
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R54 Discovery Miles 540
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Dala Craft Pom Poms - Assorted Colours…
R34 Discovery Miles 340
Call The Midwife - Season 10
Jenny Agutter, Linda Bassett, … DVD R209 Discovery Miles 2 090
Simba ABC Elephant Ring Rattle
 (3)
R66 Discovery Miles 660
Carriwell Premium Maternity & Hospital…
R90 R69 Discovery Miles 690
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Sony PlayStation 4 Slim Console Bundle…
R8,799 Discovery Miles 87 990
Unicorn Core 75 Flights (Blue & White…
R29 R26 Discovery Miles 260

 

Partners