Hazem M. El-Bakry, Nikos Mastorakis, A real-time intrusion detection algorithm for network security, Proceedings of the 8th conference on Applied informatics. Intrusion Detection. Rebecca Gurley Bace. © |Sams Publishing | Available. Share this page. Intrusion Detection. View larger. “Intrusion Detection”, Rebecca Gurley Bace, , , U$/C $ %A Rebecca Gurley Bace %C W. rd Street, Indianapolis, IN

Author: Tesho Murisar
Country: Latvia
Language: English (Spanish)
Genre: Marketing
Published (Last): 19 March 2013
Pages: 451
PDF File Size: 6.7 Mb
ePub File Size: 9.35 Mb
ISBN: 890-7-42035-906-3
Downloads: 44150
Price: Free* [*Free Regsitration Required]
Uploader: Tausar

Nick Brooke added it Aug 27, Marc marked it as to-read Aug 30, More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed intrsion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.

Include highly engaging bespoke games, animations and simulations to aid students’ understanding, promote active learning and accommodate their differing learning styles. Concentrating on a conceptual model the book is occasionally weak in regard to practical implementation, but more than makes up for this textual deficiency with a strong sense of historical background, developmental approaches, and references to specific implementations that the practitioner may research separately.

With the number of intrusion and hacking incidents around the world on the rise, the importance of having gurlry intrusion detection systems in place is greater than ever. Retrieved 18 April Overview Features Contents Order Overview.

The organization of this chapter is a bit loose, with some sections, such as those on reliability and analysis, seeming to overlap material. Selected pages Title Page. You will be informed within 7 days if your order is not approved. We don’t recognize your username or password.

  ICL 2822 PDF

Intrusion Detection, Rebecca Gurley Bace,

After graduation inBace started working at the NSAand while searching for a flexible job to allow her to care for her autistic son who was later diagnosed with leukemiashe took an assignment in in the National Computer Security Center.

This is a well-researched and well-written text. Digital forensic process Data acquisition Gurpey evidence eDiscovery Deyection forensics. Looking for technical support for your Pearson course materials? Open Preview See a Problem?

Regecca Sarmento rated it liked it Nov 18, You can also include skills content, your own material and brand it to your course and your institution. If You’re a Student Buy this product Additional order info. Dtection is very close in both quality and usefulness, and possibly has the edge in practical terms, although his book is a bit narrower in focus. By using this site, you agree to the Terms of Use and Privacy Policy. Organization through a full acquisition-lifecycle —From initial requirements definition to deployment for a commercial intrusion detection product.

Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: If you’re interested in creating a cost-saving package for your students contact your Pearson Account Manager.

Jari Pirhonen added it Feb 01, She was approached by a couple of Xerox technicians who needed to fill affirmative action requirements, and accepted a job as a specialist repairing copier machines.

Chapter one presents a history of intrusion detection starting with system accounting, through audit systems, to the most recent research and experimental systems. There are no discussion topics on this book yet.

Bace’s take on this topic and title intrudion a solid and comprehensive background for anyone pursuing the subject.

In this section:

Chester Wright marked it as to-read Jul 22, Rebecca “Becky” Gurley Bace — was an American computer security expert and pioneer in intrusion detection. Pearson Learning Solutions will partner with you to create a completely bespoke technology solution to your course’s specific requirements and needs.


Writers about computer security Digital forensics detectiin Women in computing Women computer scientists American computer scientists National Security Agency people American venture capitalists People with epilepsy Los Alamos National Laboratory personnel Loyola University Maryland alumni University of South Alabama people People in information technology births deaths.

Muhammad Naufal marked it as to-read May 04, The definitions and concepts focus from broad security theory to specific intrusion detection principles and variants in chapter two. Following the death of her son, Bace went to serve as the deputy security officer at Los Alamos National Laboratory in the Computing, Information and Communications Division.

Alex marked it as to-read Dec 31, Choosing your systems’ responses to detected problems and tie the results back into the site security management process.

Rebecca Bace

The work intrusioh protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Matt rated it really liked it May 03, With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever.

Tom Killalea added it Mar 28,