Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response Book

ISBN: 0966670078

ISBN13: 9780966670073

Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response

The new book - Intrusion Detection - by best selling computer security author Edward Amoroso introduces a fascinating security technique for catching Internet crackers in real time. The book outlines critical issues in intrusion detection including techniques for Internet surveillance, correlation, trace back, honey pot traps, and incident response. The book includes hundreds of illustrations and provides case studies from popular commercial systems. An annotated biliography and index is included. This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Very Good

$8.49
Save $41.46!
List Price $49.95
Almost Gone, Only 1 Left!

You Might Also Enjoy

Python
Python
Mike McGrath

from: $5.09

iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
Gina Smith, Steve Wozniak

from: $4.99

Technopoly: The Surrender of Culture to Technology
Technopoly: The Surrender of Culture to Technology
Neil Postman

from: $8.89

Python Machine Learning: Machine Learning and Deep Learning with Python, scikit-learn, and TensorFlow 2
Python Machine Learning: Machine Learning and Deep Learning with Python, scikit-learn, and TensorFlow 2
Sebastian Raschka, Vahid Mirjalili

from: $11.49

La technique ou l'enjeu du siècle
La technique ou l'enjeu du siècle
Jacques Ellul

from: $10.49

The Language of Medicine
The Language of Medicine
Davi-Ellen Chabner, Davi-Ellen Chabner BA MAT

from: $5.13

Fusion 360 for Makers: Design Your Own Digital Models for 3D Printing and Cnc Fabrication
Fusion 360 for Makers: Design Your Own Digital Models for 3D Printing and Cnc Fabrication
Lydia Sloan Cline

from: $8.89

Python for Kids
Python for Kids
Jason R. Briggs

from: $5.79

Adobe Illustrator CS2 Classroom in a Book
Adobe Illustrator CS2 Classroom in a Book
Adobe Creative Team, Brian Wood, Brian Wood

from: $5.19

How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life
J.J. Luna

from: $6.49

You Are Not a Gadget: A Manifesto
You Are Not a Gadget: A Manifesto
Jaron Lanier

from: $4.39

Facebook Marketing All-In-One for Dummies
Facebook Marketing All-In-One for Dummies
Phyllis Khare, Andrea Vahl, Amy Porterfield, John Haydon, Jan Zimmerman

from: $5.29

The Usborne Introduction to The Second World War
The Usborne Introduction to The Second World War
Paul Dowswell

from: $4.09

Switching to the Mac: The Missing Manual, El Capitan Edition
Switching to the Mac: The Missing Manual, El Capitan Edition
David Pogue

from: $6.79

Basic Italian: Learn to Speak and Understand Italian with Pimsleur Language Programs (Basic)
Basic Italian: Learn to Speak and Understand Italian with Pimsleur Language Programs (Basic)
Pimsleur Language Programs

from: $18.70

The Biblical Basis of Christian Counseling for People Helpers: Relating the Basic Teachings of Scripture to People's Problems
The Biblical Basis of Christian Counseling for People Helpers: Relating the Basic Teachings of Scripture to People's Problems
Gary R. Collins

from: $4.59

Internet and Computer Slang Dictionary
Internet and Computer Slang Dictionary
James S. Kittell II

from: $14.99

Jony Ive: The Genius Behind Apple's Greatest Products
Jony Ive: The Genius Behind Apple's Greatest Products
Leander Kahney

from: $11.49

But How Do It Know? - The Basic Principles of Computers for Everyone
But How Do It Know? - The Basic Principles of Computers for Everyone
J. Clark Scott

from: $18.19

How Google Works
How Google Works
Jonathan Rosenberg, Eric Schmidt

from: $4.19

Present Shock: When Everything Happens Now
Present Shock: When Everything Happens Now
Douglas Rushkoff

from: $4.39

Coding for Beginners in easy steps: Basic Programming for All Ages
Coding for Beginners in easy steps: Basic Programming for All Ages
Mike McGrath

from: $4.59

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell

from: $9.99

Creative Selection: Inside Apple's Design Process During the Golden Age of Steve Jobs
Creative Selection: Inside Apple's Design Process During the Golden Age of Steve Jobs
Ken Kocienda

from: $7.39

Customer Reviews

4 customer ratings | 4 reviews

Rated 4 stars
This is a graduate-level academic text

This is one of at least three books you need if you are doing academic research on intrusion detection. This book is a graduate-level text with theory and references. The second book you will need is Intrusion Detection (MTP) which also contains theory and references, but from a different angle. The third book you will need is Network Intrusion Detection (3rd Edition) (Voices (New Riders)) which explains how to actually...

0Report

Rated 5 stars
Excellent Theoritical AND Practical Book

To quote the author, the book contains "Lots of information and no quick fixes." And the book contains exactly that! Bravo! The book is concise, relevant, and very well written. It provides excellent information without getting bogged down in minute theory or implementation details.The book provides a solid but practical theoretical background to intrusion detection. It contains relevant real world examples. It does not...

0Report

Rated 4 stars
Good theoretical approach

This book is not intended as a practitioner's handbook--that is what Northcutt's book is for. Amoroso's book is used as a text in his graduate classes.If you want to understand the subject from a conceptual level, this book succeeds admirably. It is a bit dry, but acceptably so. Given that Amoroso has taught the subject several times, the organization is logical. The sources are extensive (although other academics...

0Report

Rated 5 stars
A well focused taxonomy of intrusion detection

I came across this book as a required text for Dr. Amoroso's graduate course, Software System Security (SE513), at Monmouth University. The book is well organized into eight chapters that give you the primary definitions in chapter one. In chapter two the methods of intrusion detection, such as audit trail processing, are intorduced. The author then procedes to the architecture of intrusion detection in chapter 3. The...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured