Related Subjects
Aerospace Algorithms Computer Science Computers Computers & Technology Electrical & Electronics Engineering Library Management Machine Vision Mathematics Mechanical Mechanical Engineering Multimedia Information Systems Network Administration Networking Pattern Recognition Politics & Social Sciences Programming Science & Math Social Sciences Software Engineering Technology Textbooks Web Development & Design Web ServicesThis is one of at least three books you need if you are doing academic research on intrusion detection. This book is a graduate-level text with theory and references. The second book you will need is Intrusion Detection (MTP) which also contains theory and references, but from a different angle. The third book you will need is Network Intrusion Detection (3rd Edition) (Voices (New Riders)) which explains how to actually...
0Report
To quote the author, the book contains "Lots of information and no quick fixes." And the book contains exactly that! Bravo! The book is concise, relevant, and very well written. It provides excellent information without getting bogged down in minute theory or implementation details.The book provides a solid but practical theoretical background to intrusion detection. It contains relevant real world examples. It does not...
0Report
This book is not intended as a practitioner's handbook--that is what Northcutt's book is for. Amoroso's book is used as a text in his graduate classes.If you want to understand the subject from a conceptual level, this book succeeds admirably. It is a bit dry, but acceptably so. Given that Amoroso has taught the subject several times, the organization is logical. The sources are extensive (although other academics...
0Report
I came across this book as a required text for Dr. Amoroso's graduate course, Software System Security (SE513), at Monmouth University. The book is well organized into eight chapters that give you the primary definitions in chapter one. In chapter two the methods of intrusion detection, such as audit trail processing, are intorduced. The author then procedes to the architecture of intrusion detection in chapter 3. The...
0Report