LEADER 02101nmm a2200445 u 4500
001 EB001939783
003 EBX01000000000000001102685
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780321591807 
020 |a 9780321591890 
020 |a 0321591895 
050 4 |a QA76.9.A25 
100 1 |a Trost, Ryan 
245 0 0 |a Practical intrusion analysis  |b prevention and detection for the twenty-first century  |c by Ryan Trost 
260 |a Upper Saddle River, N.J.  |b Addison-Wesley  |c 2010 
300 |a 1 online resource  |b illustrations 
505 0 |a Network overview -- Infrastructure monitoring -- Intrusion detection systems -- Lifecycle of a vulnerability -- Proactive intrusion prevention and response via attack graphs -- Network flows and anomaly detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection for IT -- Geospatial intrusion detection -- Visual data communications -- Return on investment : business justification 
505 0 |a Includes bibliographical references and index 
653 |a Computer security 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Surveillance 
653 |a Computer networks / Monitoring / fast 
653 |a Computer networks / Monitoring / http://id.loc.gov/authorities/subjects/sh2006002867 
653 |a Computers / Access control / fast 
653 |a Computers / Access control / http://id.loc.gov/authorities/subjects/sh85029553 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Ordinateurs / Accès / Contrôle 
653 |a Computer security / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBA951486 
776 |z 9780321591807 
776 |z 0321591801 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321591890/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8