Written for IT professionals and security analysts, this book provides an in-depth analysis of various monitoring algorithms that are used to detect anomalous access to computer systems. The authors compare and contrast different approaches, providing detailed case studies and practical advice on how to implement effective monitoring strategies.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it.
This work is in the "public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.
Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781022246324_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware. Artikel-Nr. 9781022246324
Anzahl: 2 verfügbar