Get Free Shipping on orders over $79
Statistical Techniques for Network Security : Modern Statistically-Based Intrusion Detection and Protection - Yun Wang

Statistical Techniques for Network Security

Modern Statistically-Based Intrusion Detection and Protection

By: Yun Wang

Hardcover | 31 October 2008

At a Glance

Hardcover


$277.70

or 4 interest-free payments of $69.42 with

 or 

Ships in 7 to 10 business days

Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.""Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection"" bridges between applied statistical modeling techniques and network security to provide statistical modeling and simulating approaches to address the needs for intrusion detection and protection. Covering in-depth topics such as network traffic data, anomaly intrusion detection, and prediction events, this authoritative source collects must-read research for network administrators, information and network security professionals, statistics and computer science learners, and researchers in related fields.

More in Network Security

Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Cyberethics - Richard A. Spinello

Paperback

$119.75

Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Tech-Smart Parenting : How to keep your kids happy and safe online - Catherine Knibbs
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Internet of Multimedia Things Security : Tools and Applications - PhD  Preethi
Zero Trust Networks : Building Secure Systems in Untrusted Network - Christina Morillo
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown