B Gengler - Computer Fraud & Security, 2002 - Elsevier
Attempting to protect enterprise networks from network attacks and unauthorized access, two companies recently introduced new intrusion detection management systems. Intrusion …
JS Sherif, R Ayers, TG Dearmond - Information Management & …, 2003 - emerald.com
Organizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a …
K Richards - Computers & Security, 1999 - Elsevier
In its simplest form, an intrusion detection system (IDS) is a burglar alarm. Its purpose is to monitor a resource and notify someone in the event of a specific occurrence. In computer …
DG Conorich - Information Systems Security, 2004 - Taylor & Francis
Douglas G. Conorich here is a growing critical need for security in corporate computer systems today. Corporations around the world have embraced the Internet with surprising …
In the last three years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and …
En la actualidad existen muchas herramientas que permiten proteger los computadores y las redes informáticas corporativas de posibles ataques, estos aplicativos permiten detectar …
K Labib - XRDS: Crossroads, The ACM Magazine for Students, 2004 - dl.acm.org
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and …
L Pei, J Schütte, C Simon - Carlos Simon, 2007 - it.uu.se
Lisong In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. A system that …