What is included with this book?
Managing threats to Web databases and cyber systems | p. 3 |
Intrusion detection : a survey | p. 19 |
Learning rules and clusters for anomaly detection in network traffic | p. 81 |
Statistical causality analysis of Infosec alert data | p. 101 |
Understanding network security data : using aggregation, anomaly detection, and cluster analysis for summarization | p. 129 |
Early detection of active Internet worms | p. 147 |
Sensor families for intrusion detection infrastructures | p. 181 |
Encapsulation of user's intent : a new proactive intrusion assessment paradigm | p. 221 |
Topological analysis of network attack vulnerability | p. 247 |
Analyzing survivable computation in critical infrastructures | p. 267 |
Alert management systems : a quick introduction | p. 281 |
Cyber forensics : managing, modeling, and mining data for investigation | p. 295 |
Cyber forensics : issues and approaches | p. 313 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.