Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...
The thing about Windows XP Professional is, users love it. It has a slick interface and it behaves far more intelligently and predictably than some of its predecessors. The new system of software registration aside, Windows XP surely is the most highly acclaimed Microsoft...
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Are You Ready for the Network Equivalent of Guerrilla Warfare?
Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...
In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.
C.A. Murff MCSE, MCT, CTT, CNA Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.
Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using...
Benjamin Crowell, in "The Assayer", book reviews and discussion for the free-information renaissance ...There's ... emphasis on teaching computer science not just as a technical trade but as a mental discipline.
This book is aimed at intermediate and advanced Web designers looking to make the leap into server-side programming. You’ll be expected to be comfortable with simple HTML, as I’ll make use of it without much in the way of explanation. No knowledge of JavaScript is assumed or required, but if you do know JavaScript, you’ll find it...
"WOW! This books is incredibly detailed and Wolfgang has done an excellent job. I don't think I could have gone into that much detail if I wrote a book mysel. Kudos!" —Ethan Galstad, Nagios main developer
Good system administrators know about problems long before anyone asks,...
An overview of the multidisciplinary field of data mining, this book focuses specifically on new methodologies and case studies. Included are case studies written by 44 leading scientists and talented young scholars from seven different countries. Topics covered include data mining based on rough sets, the impact of missing data, and mining free...
Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic,...
"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...