TY - BOOK AU - Bace,Rebecca Gurley TI - Intrusion detection T2 - Technology series SN - 1578701856 AV - TK 5105.59 B117i 2000 PY - 2000/// CY - Indianapolis, IN PB - Macmillan Technical Pub. KW - Computer networks KW - Security measures KW - Râeseaux d'ordinateurs KW - Mesures de sãuretâe KW - ram KW - Seguridad en computadores KW - Redes de computadores KW - Medidas de seguridad N1 - 1 History of Intrusion Detection 7 -- 4 Analysis Schemes 79 -- 5 Responses 121 -- 6 Vulnerability Analysis: A Special Case 135 -- 7 Technical Issues 155 -- 8 Understanding the Real-World Challenge 173 -- 9 Legal Issues 195 -- 10 For Users 217 -- 11 For Strategists 235 -- 12 For Designers 255 -- 13 Future Needs 275 -- Appendix D Checklist 321 N2 - Presenting real analysis schemes and responses as well as a detailed discussion of the vulnerabilities that exist in many systems and approaches to testing systems for these problems, this book is for courses in network security ER -