1 / 256
文档名称:

[2008] - Intrusion Detection Systems (Advances In Information Security) - - [0387772650].pdf

格式:pdf   页数:256
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

[2008] - Intrusion Detection Systems (Advances In Information Security) - - [0387772650].pdf

上传人:bolee65 2014/4/23 文件大小:0 KB

下载得到文件列表

[2008] - Intrusion Detection Systems (Advances In Information Security) - - [0387772650].pdf

文档介绍

文档介绍:Intrusion Detection
Systems



Edited by



Roberto Di Pietro
Università di Roma Tre
Italy

and

Luigi V. Mancini
Università di Roma “La Sapienza”
Italy
Editors:
Roberto Di Pietro Luigi V. Mancini
Università di Roma Tre Università di Roma "La Sapienza"
di Matematica di Informatica
S. Leonardo Murialdo, 1 Via Salaria, 113
00146 - Roma 00197 - Roma
Italy Italy
******@ lv.******@

Series Editor:
Sushil Jajodia
e Mason University
Center for Secure Information Systems
4400 University Drive
Fairfax VA 22030-4444, USA
******@



ISBN: 978-0-387-77265-3 e-ISBN: 978-0-387-77266-0
Library of Congress Control Number: 2008924099
 2008 Springer Science+Business Media, LLC.
All rights reserved. This work may not be translated or copied in whole or in part
without the written permission of the publisher (Springer Science+Business Media,
LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in
connection with reviews or scholarly analysis. Use in connection with any form of
information storage and retrieval, electronic adaptation, computer software, or by
similar or dissimilar methodology now known or hereafter developed is forbidden.
The use in this publication of trade names, trademarks, service marks and similar
terms, even if they are not identified as such, is not to be taken as an expression of
opinion as to whether or not they are subject to proprietary rights.

Printed on acid-free paper

9 8 7 6 5 4 3 2 1

Foreword
In our world of ever-increasing connectivity, there is an on-going threat of
intrusion, denial of service attacks, or countless other abuses puter -
work resources. In particular, these threats continue to persist even on account of
the flaws of mercial Intrusion Detection Systems (IDS). These flaws are
the result of the concurrence of several ings such as excessiv