Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Copyright: © 2012 |Pages: 468
ISBN13: 9781609608361|ISBN10: 1609608364|EISBN13: 9781609608378
DOI: 10.4018/978-1-60960-836-1
Cite Book Cite Book

MLA

Kabiri, Peyman, editor. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks. IGI Global, 2012. https://doi.org/10.4018/978-1-60960-836-1

APA

Kabiri, P. (Ed.). (2012). Privacy, Intrusion Detection and Response: Technologies for Protecting Networks. IGI Global. https://doi.org/10.4018/978-1-60960-836-1

Chicago

Kabiri, Peyman, ed. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-836-1

Export Reference

Mendeley
Favorite Full-Book Download

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data.

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Section 1  (pages 12-12)
Section 1
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Section 2  (pages 168-168)
Section 2
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.