Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Author:   David J. Marchette
Publisher:   Springer-Verlag New York Inc.
Edition:   2001 ed.
ISBN:  

9780387952819


Pages:   333
Publication Date:   26 June 2001
Format:   Hardback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $303.60 Quantity:  
Add to Cart

Share |

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint


Add your own review!

Overview

Full Product Details

Author:   David J. Marchette
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2001 ed.
Dimensions:   Width: 15.60cm , Height: 2.00cm , Length: 23.40cm
Weight:   0.694kg
ISBN:  

9780387952819


ISBN 10:   0387952810
Pages:   333
Publication Date:   26 June 2001
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

1 TCP/IP Networking.- 2 Network Statistics.- 3 Evaluation.- 4 Network Monitoring.- 5 Host Monitoring.- 6 Computer Viruses and Worms.- 7 Trojan Programs and Covert Channels.- Appendix A WellKnown Port Numbers.- Appendix B Trojan Port Numbers.- Appendix C Country Codes.- Appendix D Security Web Sites.- D.1 Introduction.- D.2 General Information Web Sites.- D.3 Security.- D.4 Cyber Crime.- D.5 Software.- D.6 Data.- D.7 Intrusion Detection.- Acronyms.- Author Index.

Reviews

From the reviews: TECHNOMETRICS After reading this book...I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area...This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible. SHORT BOOK REVIEWS The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance. ISI Short Book Reviews, April 2002 This book is a very good text on intrusion detection, written by an author who has direct practical experience ... . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. ... the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example ... of interdisciplinarity, which is necessary in fields so complex as computer security. (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002) This book is about one of those areas that provides rich opportunities for statisticians ... . The tools for computer intrusion detection are essentially statistical ... . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples ... . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance. (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)


From the reviews: <p>TECHNOMETRICS <p> After reading this booka ]I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this areaa ]This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible. <p>SHORT BOOK REVIEWS <p> The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance. <br>ISI Short Book Reviews, April 2002 <p> This book is a very good text on intrusion detection, written by an author who has direct practical experience a ] . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. a ] the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example a ] of interdisciplinarity, which is necessary in fields so complex as computer security. (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002) <p> This book is about one of those areas that providesrich opportunities for statisticians a ] . The tools for computer intrusion detection are essentially statistical a ] . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples a ] . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance. (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List