Skip to content
Scan a barcode
Scan
Added to your cart

The Pritikin Program for Diet and Exercise 1979 Edition

No Synopsis Available.

Recommended

Format: Paperback

Temporarily Unavailable

We receive 1 copy every 6 months.

Related Subjects

Engineering Technology

Customer Reviews

0 customer rating | 0 review

Rated 4 stars
This is a graduate-level academic text

This is one of at least three books you need if you are doing academic research on intrusion detection. This book is a graduate-level text with theory and references. The second book you will need is Intrusion Detection (MTP) which also contains theory and references, but from a different angle. The third book you will need is Network Intrusion Detection (3rd Edition) (Voices (New Riders)) which explains how to actually...

0Report

Rated 5 stars
Excellent Theoritical AND Practical Book

To quote the author, the book contains "Lots of information and no quick fixes." And the book contains exactly that! Bravo! The book is concise, relevant, and very well written. It provides excellent information without getting bogged down in minute theory or implementation details.The book provides a solid but practical theoretical background to intrusion detection. It contains relevant real world examples. It does not...

0Report

Rated 4 stars
Good theoretical approach

This book is not intended as a practitioner's handbook--that is what Northcutt's book is for. Amoroso's book is used as a text in his graduate classes.If you want to understand the subject from a conceptual level, this book succeeds admirably. It is a bit dry, but acceptably so. Given that Amoroso has taught the subject several times, the organization is logical. The sources are extensive (although other academics...

0Report

Rated 5 stars
A well focused taxonomy of intrusion detection

I came across this book as a required text for Dr. Amoroso's graduate course, Software System Security (SE513), at Monmouth University. The book is well organized into eight chapters that give you the primary definitions in chapter one. In chapter two the methods of intrusion detection, such as audit trail processing, are intorduced. The author then procedes to the architecture of intrusion detection in chapter 3. The...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured