Related Books
Language: en
Pages: 427
Pages: 427
Type: BOOK - Published: 2017-09-08 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical
Language: en
Pages: 570
Pages: 570
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
Language: en
Pages: 200
Pages: 200
Type: BOOK - Published: 2014-02-28 - Publisher: World Scientific
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that
Language: en
Pages: 496
Pages: 496
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet
Language: en
Pages: 452
Pages: 452
Type: BOOK - Published: 2017-09-18 - Publisher: CRC Press
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB)