Call Us 080-41656200 (Mon-Sat: 10AM-8PM)
Free Shipping above Rs. 1499
Cash On Delivery*



Marketed By :  VDM Verlag Dr. Müller   Sold By :  Kamal Books International  
Delivery in :  10-12 Business Days


Check Your Delivery Options

Rs. 3,651

Availability: In stock

  • Product Description

All computer security breaches cannot be prevented using access control Mechanism and information flow control technique. These breaches may be due to System software flaws, improper system administration procedures or failure of the Authentication module. Intrusion detection can play an important role in this type of Breaches. This book concentrates on intrusion detection as a second line of Defense after the access control mechanism in the system. This book provides an Solution to the given problem: Can we usefully and effectively detect site security Violations happening in the system when the access controls mechanisms fail? A More descriptive form statement is: An intruder may get access to the system by overcoming the access control mechanisms under certain circumstances. Therefore, important events occurring in the network that are of interest to the security are logged in the system. These logs can be analyzed to infer any site security violations that could have happened in the network with architecture of De- centralized Distribution Intrusion Detection system.

Product Specifications
SKU :COC47428
AuthorPravin Shetty
Number of Pages68
Publishing Year2010-03-05T00:00:00.000
Edition1 st
Book TypeComputer hardware
Country of ManufactureIndia
Product BrandVDM Verlag Dr. Müller
Product Packaging InfoBox
In The Box1 Piece
Product First Available On ClickOnCare.com2015-04-08 00:00:00