0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.): Stefan Axelsson, David Sands Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.)
Stefan Axelsson, David Sands
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection Through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems.

Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006): Stefan... Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Stefan Axelsson, David Sands
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Papery A5 WOW 2025 Diary - Sunflower
R349 R300 Discovery Miles 3 000
Christian Dior Dior Homme Sport Eau De…
R3,065 Discovery Miles 30 650
Midnights
Taylor Swift CD R394 Discovery Miles 3 940
Sudocrem Skin & Baby Care Barrier Cream…
R210 Discovery Miles 2 100
Ab Wheel
R209 R149 Discovery Miles 1 490
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Estee Lauder Beautiful Belle Eau De…
R2,077 R1,535 Discovery Miles 15 350
CyberPulse Gaming Chair
R3,999 R3,278 Discovery Miles 32 780
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners