pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INTRUSION DETECTION IN DISTRIBUTED SYSTEMS
AN ABSTRACTION-BASED APPROACH
By: Sushil Jajodia, Peng Ning, Xiaoyang Wang
Format: Hardback

List price: £113.00


We believe that this item is permanently unavailable, and so we cannot source it.

ISBN 10: 140207624X
ISBN 13: 9781402076244
Publisher: KLUWER ACADEMIC PUBLISHERS
Pub. date: 31 October, 2003
Edition: 2004 ed.
Series: Advances in Information Security v. 9
Pages: 136
Description: Presents research contributions in intrusion detection in distributed systems. The first presents an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second gives a framework for modeling requests among cooperative IDSs and the third looks at coordinating IDSs for distributed event correlation.
Synopsis: Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Illustrations: biography
Publication: US
Imprint: Kluwer Academic Publishers
Returns: Returnable
Some other items by this author:
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
CHINA'S RISING RESEARCH UNIVERSITIES
CHINA'S RISING RESEARCH UNIVERSITIES (HB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY - ESORICS 2009 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
CYBER WARFARE (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MOVING TARGET DEFENSE II (PB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA DATABASE SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
SECURITY FOR WIRELESS SENSOR NETWORKS (HB)
SECURITY FOR WIRELESS SENSOR NETWORKS (PB)
SECURITY OF AD-HOC AND SENSOR NETWORKS (PB)
TEMPORAL DATABASES (PB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)
WEB INFORMATION SYSTEMS ENGINEERING - WISE 2008 (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket