46,95 €*
-12 % UVP 53,49 €
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.
This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .
This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.
This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .
Introduces new research and development efforts for cybersecurity solutions and applications
Presents Memristor-based technologies for cybersecurity
Covers anomaly detection and algorithms for network security
Includes supplementary material: [...]
Erscheinungsjahr: | 2013 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: |
x
285 S. |
ISBN-13: | 9781461475965 |
ISBN-10: | 1461475961 |
Sprache: | Englisch |
Herstellernummer: | 86186870 |
Einband: | Gebunden |
Redaktion: | Pino, Robinson E. |
Herausgeber: | Robinson E Pino |
Hersteller: |
Springer US
Springer New York Springer US, New York, N.Y. |
Verantwortliche Person für die EU: | Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com |
Maße: | 241 x 160 x 20 mm |
Von/Mit: | Robinson E. Pino |
Erscheinungsdatum: | 15.06.2013 |
Gewicht: | 0,611 kg |
Introduces new research and development efforts for cybersecurity solutions and applications
Presents Memristor-based technologies for cybersecurity
Covers anomaly detection and algorithms for network security
Includes supplementary material: [...]
Erscheinungsjahr: | 2013 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: |
x
285 S. |
ISBN-13: | 9781461475965 |
ISBN-10: | 1461475961 |
Sprache: | Englisch |
Herstellernummer: | 86186870 |
Einband: | Gebunden |
Redaktion: | Pino, Robinson E. |
Herausgeber: | Robinson E Pino |
Hersteller: |
Springer US
Springer New York Springer US, New York, N.Y. |
Verantwortliche Person für die EU: | Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com |
Maße: | 241 x 160 x 20 mm |
Von/Mit: | Robinson E. Pino |
Erscheinungsdatum: | 15.06.2013 |
Gewicht: | 0,611 kg |