Dynamic networks and cyber-security
As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue. Academic readers wil...
Saved in:
| Main Authors: | Adams, Niall M. (Author), Heard, Nicholas (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Singapore
World Scientific Pub.
2016
|
| Series: | Security science and technology ;
volume 1 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Multimedia communications networks Technologies and services
by: lh
by: lh
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Network security and management
by: Singh, Brijendra
Published: (2012)
by: Singh, Brijendra
Published: (2012)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Inside the internet's resource reservation protocol foundations for quality of service
by: Durham
Published: (1999)
by: Durham
Published: (1999)
ATM networks performance modeling and analysis
Published: (1997)
Published: (1997)
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Security + guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
CCNA security official exam certification guide
by: Watkins, Michael
Published: (2008)
by: Watkins, Michael
Published: (2008)
Zero trust networks building secure systems in untrusted networks
by: Gilman, Evan, et al.
Published: (2017)
by: Gilman, Evan, et al.
Published: (2017)
Network security, firewalls, and VPNs
by: Stewart, James Michael, et al.
Published: (2021)
by: Stewart, James Michael, et al.
Published: (2021)
Managing bandwidth deploying Q1 in enterprise networks
by: Croll
by: Croll
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Network vulnerability assessment identify security loopholes in your network's infrastructure
by: Rahalkar, Sagar
Published: (2018)
by: Rahalkar, Sagar
Published: (2018)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012)
by: Ganguly, Debashis
Published: (2012)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Security+ guide to network security fundamentals
by: Ciampa, Mark D.
Published: (2012)
by: Ciampa, Mark D.
Published: (2012)
Network defense and countermeasures principles and practices
by: Easttom, Chuck
Published: (2018)
by: Easttom, Chuck
Published: (2018)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Multimedia-enabled sensors in IoT data delivery & traffic modelling
by: Al-Turjman, Fadi
Published: (2018)
by: Al-Turjman, Fadi
Published: (2018)
Applied network security monitoring collection, detection and analysis
by: Sanders, Chris
Published: (2014)
by: Sanders, Chris
Published: (2014)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Similar Items
-
Data analysis for network cyber-security
Published: (2014) -
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019) -
Multimedia communications networks Technologies and services
by: lh -
Network security how to plan for it and achieve it
by: Baker
Published: (1995) -
Network security architectures
by: Convery, Sean
Published: (2012)


