Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Peyman Kabiri (Iran University of Science and Technology, Iran)
Release Date: October, 2011|Copyright: © 2012 |Pages: 468
DOI: 10.4018/978-1-60960-836-1
ISBN13: 9781609608361|ISBN10: 1609608364|EISBN13: 9781609608378
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data.

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Anomaly Detection
  • Botnet Behavior Detection
  • Data Collection Mechanisms for Intrusion Detection
  • Distributed Intrusion Detection
  • DoS Attack Detection on SIP based Services
  • Enterprise Networks Protection
  • Intrusion Detection
  • Intrusion Prevention
  • Intrusion Response
  • Network Feature Selection for Intrusion Detection
Reviews and Testimonials

The audience for this book will include but not be limited to scholars and industry experts. Network administrators and security officers may also find the book interesting.

– Peyman Kabiri, Iran University of Science and Technology, Iran
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Peyman Kabiri received his PhD in Computing and MSc in Real time Systems from the Nottingham Trent University, Nottingham-UK in years 2000 and 1996 respectively. He received his BEng in Computer Hardware Engineering from Iran’s University of Science and Technology, Tehran-Iran in 1992. He was with the Faculty of Computer Science/University of New Brunswick as project coordinator from early September 2004 till the end of September 2005.

His previous academic positions were as follows: Assistant Professor in School of Computer Engineering Iran University of Science and Technology where he is currently an Assistant Professor and Director of the Intelligent Automation Laboratory. He teaches courses in under graduate, post graduate levels and supervises BEng, MSc, and PhD students. He has published a number of journals and conference papers and he was Reviewer for several conferences and journals. His research interests include network intrusion detection, machine learning, remote sensing and robotics.

Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.