| In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs).
Intrusion Detection Systems is an edited volume by world class leaders in this field.
This edited volume sheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. This volume is presented in an easy-to-follow style while including a rigorous treatment of the issues, solutions, and technologies tied to the field.
Intrusion Detection Systems is designed for a professional audience composed of researchers and practitioners within the computer network and information security industry. It is also suitable as a reference or secondary textbook for advanced-level students in computer science.
|
|
|
Bayesian Analysis of Item Response Theory Models Using SAS
Written especially for psychometricians, scale developers, and practitioners interested in applications of Bayesian estimation and model checking of item response theory (IRT) models, this book teaches you how to accomplish all of this with the SAS MCMC Procedure. Because of its tutorial structure, Bayesian Analysis of Item Response... | | Calculus Second Edition
On Teaching Mathematics
As a young instructor, I enjoyed teaching but I didn’t appreciate how difficult it is to
communicate mathematics effectively. Early in my teaching career, I was confronted with
a student rebellion when my efforts to explain epsilon-delta proofs were not greeted with
the enthusiasm I... | | MCSE: Exchange Server 2000 Administration Study GuideHere's the book you need to prepare for Exam 70-224, Installing, Configuring, and Administering Microsoft Exchange 2000 Server:
- Full coverage of every exam objective—all the information you need to know
- Practical information on installing, configuring, and administering Exchange 2000 Server
... |
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of... | | Building Wireless Community Networks, 2nd EditionBuilding Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and... | | |
|