Muutke küpsiste eelistusi

E-raamat: Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 4637
  • Ilmumisaeg: 17-Aug-2007
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540743200
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 4637
  • Ilmumisaeg: 17-Aug-2007
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540743200
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
Host-Based Intrusion Detection.- Exploiting Execution Context for the
Detection of Anomalous System Calls.- Understanding Precision in Host Based
Intrusion Detection.- Anomaly-Based Intrusion Detection.- Comparing Anomaly
Detection Techniques for HTTP.- Swaddler: An Approach for the Anomaly-Based
Detection of State Violations in Web Applications.- Network-Based Intrusion
Detection and Response.- Emulation-Based Detection of Non-self-contained
Polymorphic Shellcode.- The NIDS Cluster: Scalable, Stateful Network
Intrusion Detection on Commodity Hardware.- Cost-Sensitive Intrusion
Responses for Mobile Ad Hoc Networks.- Insider Detection and Alert
Correlation.- elicit: A System for Detecting Insiders Who Violate
Need-to-Know.- On the Use of Different Statistical Tests for Alert
Correlation Short Paper.- Malicious Code Analysis.- Automated
Classification and Analysis of Internet Malware.- Out-of-the-Box Monitoring
of VM-Based High-Interaction Honeypots.- A Forced Sampled Execution Approach
to Kernel Rootkit Identification.- Evasion.- Advanced Allergy Attacks: Does a
Corpus Really Help?.- Alert Verification Evasion Through Server Response
Forging.- Malicious Code Defense.- Hit-List Worm Detection and Bot
Identification in Large Networks Using Protocol Graphs.- SpyShield:
Preserving Privacy from Spy Add-Ons.- Vortex: Enabling Cooperative Selective
Wormholing for Network Security Systems.