Intrusion Detection System

Understanding Intrusion Detection Systems Training Video  eBooks & eLearning

Posted by IrGens at Aug. 22, 2016
Understanding Intrusion Detection Systems Training Video

Understanding Intrusion Detection Systems Training Video
2016-07-15 | SKU: 02385 | .MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 125 kbps, 2 Ch | 2.75 hours | 0.99 GB
Instructor: Ric Messier

Mobile Hybrid Intrusion Detection [Repost]  eBooks & eLearning

Posted by tanas.olesya at May 22, 2016
Mobile Hybrid Intrusion Detection [Repost]

Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System by Álvaro Herrero
English | Jan. 20, 2011 | ISBN: 3642182984 | 156 Pages | PDF | 3 MB

This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book.
Rafeeq Rehman, Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, (Repost)

Rafeeq Rehman, Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
ISBN: 0131407333 | edition 2003 | PDF | 276 pages | 17 mb

Network security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
Network Intrusion Detection and Prevention: Concepts and Techniques (Repost)

Network Intrusion Detection and Prevention: Concepts and Techniques
Publisher: Springer | 2009 | ISBN: 0387887709/038788923 | English | PDF | 222 pages | 95.3 Mb

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Jay Beale, James C. Foster - Snort Intrusion Detection 2.0  eBooks & eLearning

Posted by rotten comics at Oct. 15, 2016
Jay Beale, James C. Foster - Snort Intrusion Detection 2.0

Jay Beale, James C. Foster - Snort Intrusion Detection 2.0
2003 | ISBN: 1931836744 | English | 550 pages | PDF | 7 MB
Understanding Intrusion Detection through Visualization by David Sands [Repost]

Understanding Intrusion Detection through Visualization (Advances in Information Security) by David Sands
Springer; 2006 edition | November 21, 2005 | English | ISBN: 0387276343 | 157 pages | PDF | 22 MB

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce.
Intrusion Detection and Correlation: Challenges and Solutions by Fredrik Valeur [Repost]

Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information Security) by Fredrik Valeur
Springer; 2005 edition | November 12, 2004 | English | ISBN: 0387233989 | 133 pages | PDF | 2 MB

Details how intrusion detection works in network security with comparisons to traditional methods such as firewalls and cryptography
Analyzes the challenges in interpreting and correlating Intrusion Detection alerts

Cyberarms Intrusion Detection 2.1.5 (x86/x64)  

Posted by Dizel_ at Aug. 21, 2014
Cyberarms Intrusion Detection 2.1.5 (x86/x64)

Cyberarms Intrusion Detection 2.1.5 (x86/x64) | 5 MB

The Cyberarms Intrusion Detection and Defence System protects your Windows Systems against brute force attacks and intrusion attempts. With security agent for many subsystems, IDDS is the right choice for you!
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System (repost)

Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System
by Alvaro Herrero, Emilio Corchado
English | 2011 | ISBN: 3642182984 | 146 pages | PDF | 3.29 MB
Network Intrusion Detection and Prevention: Concepts and Techniques (repost)

Ali A. Ghorbani, Wei Lu and Mahbod Tavallaee, "Network Intrusion Detection and Prevention: Concepts and Techniques"
English | 2009 | ISBN: 0387887709, 038788923 | 234 pages | PDF | 3 MB

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response.