Da: Ammareal, Morangis, Francia
Softcover. Condizione: Bon. Légères traces d'usure sur la couverture. Edition 2003. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Slight signs of wear on the cover. Edition 2003. Ammareal gives back up to 15% of this item's net price to charity organizations.
Ulteriori offerte da altri venditori AbeBooks
Usato - A partire da EUR 10,70
Scopri anche Brossura Prima edizione
Da: The Guru Bookshop, Hereford, Regno Unito
EUR 9,52
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Very Good. FIRST EDITION with dust jacket - rare and collectable - will send out 1 st class post.
Da: Der Ziegelbrenner - Medienversand, Bremen, Germania
EUR 6,00
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloEinband an den Kanten etwas bestossen, sonst gut erh., 70 S., kart. Vorgelegt 1999 als Diplomarbeit an der Technischen Universität Darmstadt, Fachbereich Elektrotechnik und Informationstechnik, Institut für Datentechnik, Lehrstuhl für Industrielle Prozeß- und Systemkommunikation, Gramm 600.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 47,70
Usato - A partire da EUR 17,90
Scopri anche Brossura
EUR 9,52
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHard Cover. Condizione: Very Good +. Second Edition. 240 x 160mm. pp. 462. English text. A comprehensive and updated volume on intrusion detection systems and implementation. Bound in original blue boards with white lettering to spine and brown and light blue lettering to front cover. Boards and pages clean and tight. 1kg.
Ulteriori offerte da altri venditori AbeBooks
Usato - A partire da EUR 28,58
Scopri anche Rilegato Prima edizione
EUR 8,75
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Very Good. 1st. Used book that is in excellent condition. May show signs of wear or have minor defects.
Ulteriori offerte da altri venditori AbeBooks
Usato - A partire da EUR 28,96
Scopri anche Rilegato Prima edizione
Da: Basi6 International, Irving, TX, U.S.A.
EUR 30,27
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 30,27
Usato - A partire da EUR 84,45
Scopri anche Brossura
Da: Libro Co. Italia Srl, San Casciano Val di Pesa, FI, Italia
EUR 35,92
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloBrossura. Condizione: fine. West Sussex, 2002; pp. 340. Libro.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 43,26
Usato - A partire da EUR 30,07
Scopri anche Brossura Prima edizione
EUR 17,95
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Academic Paper from the year 2019 in the subject Computer Science - IT-Security, grade: 2.1, Bochum University of Applied Sciences (Information Technology), course: IT security, language: English, abstract: There are various advanced intelligent home security applications operating with different systems. However, this report focuses on an effective, practical, and economically efficient GSM module integrated with IR sensors. This system is designed to detect intrusions and respond through alarm systems that restrict entry by activating various lock mechanisms to secure the premises. The system functionality of this embedded home security application is integrated with facial recognition software and Artificial Intelligence technology such as voice detection and motion sensors. The functionality of this system is easy to understand thus the users do not require advanced knowledge and skills in Information Technology. The system is user-friendly in terms of power consumption, maintenance, optimization, and allows for device interoperability.The proposed home security system integrates various components and subsystems of the IR sensors into a specially designed GSM module to come up with a functional single automated architecture that functions effectively in a wide range of intelligent home environments (Isa and Sklavos, 2017). The figure below illustrates the architecture diagram of the home security system with the design set up and connectivity of its various modules.In the current era of modern technology, the issue of home security is paramount as the burglars advanced their intrusion techniques using various applications of cutting-edge technology. The need to secure our homes arises due to due to the need to protect various important documents, property, and life. This has necessitated the development of intelligent systems that are implemented through application-based technologies to automate home security systems. The Idea of Intelligent homes is based on digital systems such as wireless technologies that are fitted with Artificial Intelligence Systems to perform certain predetermined tasks. The AI systems provide the homeowners with real-time feedback and are able to respond accordingly to various security concerns.The advancement in technology has been responsible for the development of digital home security applications allow for real-time communication and emergency response by monitoring factors such as temperature and home lighting. The automated home security systems additionally secure homes by integrating the automated user-authentication software that prevents break-ins and track illegal intrusions within and around the home.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 17,95
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Research Paper (undergraduate) from the year 2015 in the subject Computer Science - IT-Security, , language: English, abstract: This paper investigates the rise in popularity of MANETs (Mobile Ad Hoc Networks) and discusses their valuable role in all manner of situations that require a rapid deployment, and a highly flexible and dynamic approach to mobile networking. The paper examines the advantages, along with the limitations of MANETs, and identifies many of the current security concerns. Examining these concerns has exposed DoS attacks as being of high priority when planning for, and provisioning a secure network. The role of the IDS has been identified as being a crucial element in the security requirements.However, it has also been identified that the IDS is not a single solution, and that there are a number of options available, each suited to a particular scenario. Many of the IDS solutions have been identified as being complex and difficult to administer and maintain, and can lead to aggressive resource consumption.In conclusion to this paper it is felt that there is further work to be done to `develop a low resource intensive node based IDS design methodology to help protect MANET nodes from DoS attacks'.
EUR 32,01
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Very Good. 2008th Edition. Ships from the UK. Used book that is in excellent condition. May show signs of wear or have minor defects.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 39,49
Usato - A partire da EUR 37,79
Scopri anche Rilegato
Editore: CreateSpace Independent Publishing Platform, 2014
ISBN 10: 1494749696 ISBN 13: 9781494749699
Lingua: Inglese
Da: Best Price, Torrance, CA, U.S.A.
EUR 11,62
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
Da: AwesomeBooks, Wallingford, Regno Unito
EUR 29,29
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: New. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (Advances in Information Security) Brand new item sourced directly from publisher. Packed securely in tight packaging to ensure no damage. Shipped from warehouse on same/next day basis.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 37,94
Usato - A partire da EUR 83,61
Scopri anche Rilegato
Editore: CreateSpace Independent Publishing Platform, 2017
ISBN 10: 154489953X ISBN 13: 9781544899534
Lingua: Inglese
Da: Best Price, Torrance, CA, U.S.A.
EUR 13,08
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
Editore: CreateSpace Independent Publishing Platform, 2017
ISBN 10: 1546434801 ISBN 13: 9781546434801
Lingua: Inglese
Da: Best Price, Torrance, CA, U.S.A.
EUR 13,08
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
Editore: CreateSpace Independent Publishing Platform, 2011
ISBN 10: 1497307627 ISBN 13: 9781497307629
Lingua: Inglese
Da: Best Price, Torrance, CA, U.S.A.
EUR 17,42
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
EUR 33,51
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Bahamut Media, Reading, Regno Unito
EUR 35,87
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
EUR 40,95
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Pórtico [Portico], ZARAGOZA, Z, Spagna
EUR 36,00
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTapa blanda. Condizione: New. LOPEZ GONZALEZ, E. / C. MENDAÑA CUERVO, EDS.: PROCEEDINGS OF FIRST INTERNATIONAL WORKSHOP ON INTELLIGENT SYSTEMS FOR INTRUSION DETECTION AND FACING MALWARE. 978-84-9773-068-6, UNIV. DE LEON, 2003. Nuevo 720 gr. Libro.
Editore: Butterworth Publlishers, 1981
Da: BookDepart, Shepherdstown, WV, U.S.A.
EUR 9,88
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: UsedGood. ISBN: 0-409-95025-2; Hardcover; fading, light edge wear to exterior; small puncture on front cover; otherwise in good condition with clean text, firm binding.
Editore: LAP LAMBERT Academic Publishing Okt 2014, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 51,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch.
Ulteriori offerte da altri venditori AbeBooks
Nuovo - A partire da EUR 52,90
Usato - A partire da EUR 138,36
Scopri anche Brossura
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 60,47
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Editore: LAP LAMBERT Academic Publishing Jun 2016, 2016
ISBN 10: 3659888311 ISBN 13: 9783659888311
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 54,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Information security becomes a major issue in the recent decade due to wide spread of the network and Internet that consider as insecure transmission media, from this point of view security participants focus their effort to provide best method implementing information security, one of these methods is Intrusion Detection System (IDS). IDS is a software with the functions of detecting, identifying and responding to unauthorized or abnormal activities on a target system. The IDS is used by organizations to provide security for the valuable information resources (information assets). Unfortunately IDS has some errors that badly effects on the organization security, in this work, Artificial Neural Network (ANN) is used for implementing different types of intrusion detection system and improving its performance by decreasing the errors and increasing the classification and detection rates.Books on Demand GmbH, Überseering 33, 22297 Hamburg 108 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing Okt 2011, 2011
ISBN 10: 3846525103 ISBN 13: 9783846525104
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 59,00
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -This book has focussed on designing high performance Network Intrusion Detection Systems models, we have presented two designs to address limitations of Packet Loss and Low Detection Rate. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switch overs between nodes in case the traffic exceeds pre-defined threshold. Comparator Logic enhances the overall efficiency by recovering lost data and analyzing it to identify threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset.Books on Demand GmbH, Überseering 33, 22297 Hamburg 132 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing Jun 2012, 2012
ISBN 10: 3659156310 ISBN 13: 9783659156311
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 59,00
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -AIS is a generic computational paradigm that can be applied to any field, but computer security, being naturally analogous domain to human immune system, is more popular among AIS applications. The particular principles and features of the immune system are used in the development of the intrusion and malware detection framework. The authors have presented a concise literature review showing good understanding of the topic area about Artificial Immune Systems (AISs). The book has suitable technical content which the authors described with clarity of expression and relevant knowledge. The authors also make good effort in describing the technical concepts in simple and easily to understood language. The proposed two systems IIDS and IPEMDS scheme's are soundly designed with good approaches and solid arguments. The technical information presented in this book is interesting and will be useful to researchers and practitioners.Books on Demand GmbH, Überseering 33, 22297 Hamburg 148 pp. Englisch.
EUR 67,14
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 71,31
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Editore: Pearson Education, Limited, 2003
ISBN 10: 0131090852 ISBN 13: 9780131090859
Lingua: Inglese
Da: TextbookRush, Grandview Heights, OH, U.S.A.
EUR 40,47
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: Good. Expedited orders RECEIVED in 1-5 business days within the United States. Orders ship SAME or NEXT business day. We proudly ship to APO/FPO addresses. 100% Satisfaction Guaranteed!
Da: liu xing, Nanjing, JS, Cina
EUR 47,09
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: New. Paperback. Pub Date: 2012. Pages: 85 Language: Chinese in Publisher: China Machine Press. Ministry of Education. teacher practice base series of textbooks and information and network security Divine Digital school-enterprise cooperation skills training series: intrusion detection systems training tutorial focused on the Digital Network intrusion detection system the installation deployment as well as a variety of typical applications expand. Four sections: the IDS system deployment. installat.
EUR 111,88
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.