Computer Intrusion Detection and Network Monitoring
13%
off

Computer Intrusion Detection and Network Monitoring : A Statistical Viewpoint

5 (1 rating by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Description

This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
show more

Product details

  • Paperback | 333 pages
  • 152.4 x 228.6 x 17.78mm | 521.63g
  • New York, NY, United States
  • English
  • Softcover reprint of the original 1st ed. 2001
  • XVII, 333 p.
  • 1441929371
  • 9781441929372

Table of contents

Part I: Networking Basics: TCP/IP * Network Statistics * Evaluation * Part II: Intrusion Detection: Network Monitoring * Host Monitoring * Part III: Viruses and Other Creatures: Computer Viruses and Worms * Trojan Programs and Covert Channels * Appendices: Well Known Port Numbers * Trojan Port Numbers * Country Codes * Security Web Sites
show more

Review Text

From the reviews:

TECHNOMETRICS

"After reading this book...I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area...This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible."

SHORT BOOK REVIEWS

"The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance."
ISI Short Book Reviews, April 2002

"This book is a very good text on intrusion detection, written by an author who has direct practical experience ... . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. ... the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example ... of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002)

"This book is about one of those areas that provides rich opportunities for statisticians ... . The tools for computer intrusion detection are essentially statistical ... . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples ... . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)
show more

Review quote

From the reviews:


TECHNOMETRICS


"After reading this book...I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area...This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible."


SHORT BOOK REVIEWS


"The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance."
ISI Short Book Reviews, April 2002


"This book is a very good text on intrusion detection, written by an author who has direct practical experience ... . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. ... the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example ... of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002)


"This book is about one of those areas that provides rich opportunities for statisticians ... . The tools for computer intrusion detection are essentially statistical ... . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples ... . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)
show more

Rating details

1 ratings
5 out of 5 stars
5 100% (1)
4 0% (0)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X