Privacy Intrusion Detection And Response Technologies For Protecting Networks at Meripustak

Privacy Intrusion Detection And Response Technologies For Protecting Networks

Books from same Author: Peyman Kabiri

Books from same Publisher: IGI Global Scientific Publishing

Related Category: Author List / Publisher List


  • Retail Price: ₹ 17589/- [ 13.00% off ]

    Seller Price: ₹ 15302

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 13.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 13.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Peyman Kabiri
    PublisherIGI Global Scientific Publishing
    Edition1st Edition
    ISBN9781609608361
    Pages292
    BindingHardcover
    LanguageEnglish
    Publish YearOctober 2011

    Description

    IGI Global Scientific Publishing Privacy Intrusion Detection And Response Technologies For Protecting Networks by Peyman Kabiri

    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.