|Listed in category:
Have one to sell?

Information Science and Statistics Ser.: Computer Intrusion Detection and...

US $20.00
ApproximatelyRM 84.69
or Best Offer
Condition:
Brand New
Shipping:
US $4.50 (approx RM 19.05) USPS Media MailTM.
Located in: Upper Marlboro, Maryland, United States
Delivery:
Estimated between Sat, 2 Aug and Thu, 7 Aug to 94104
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
No returns accepted.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:134636027622
Last updated on Oct 09, 2023 21:29:59 MYTView all revisionsView all revisions

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
Subject
Statistics
Subject Area
Information Science
ISBN
9780387952819

About this product

Product Identifiers

Publisher
Springer New York
ISBN-10
0387952810
ISBN-13
9780387952819
eBay Product ID (ePID)
1886966

Product Key Features

Number of Pages
Xvii, 333 Pages
Publication Name
Computer Intrusion Detection and Network Monitoring : a Statistical ViewPoint
Language
English
Publication Year
2001
Subject
Probability & Statistics / General, Security / Cryptography, Networking / General, Security / General, Security / Networking
Type
Textbook
Subject Area
Mathematics, Computers
Author
David J. Marchette
Series
Information Science and Statistics Ser.
Format
Hardcover

Dimensions

Item Weight
24.5 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2001-032011
Dewey Edition
22
Reviews
From the reviews: TECHNOMETRICS "After reading this booka? I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this areaa? This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible." SHORT BOOK REVIEWS "The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance." ISI Short Book Reviews, April 2002 "This book is a very good text on intrusion detection, written by an author who has direct practical experience a? . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. a? the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example a? of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002) "This book is about one of those areas that provides rich opportunities for statisticians a? . The tools for computer intrusion detection are essentially statistical a? . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples a? . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002), From the reviews: TECHNOMETRICS "After reading this book…I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area…This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible." SHORT BOOK REVIEWS "The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance." ISI Short Book Reviews, April 2002 "This book is a very good text on intrusion detection, written by an author who has direct practical experience … . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. … the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example … of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002) "This book is about one of those areas that provides rich opportunities for statisticians … . The tools for computer intrusion detection are essentially statistical … . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples … . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002), From the reviews: TECHNOMETRICS "After reading this book...I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area...This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible." SHORT BOOK REVIEWS "The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance." ISI Short Book Reviews, April 2002 "This book is a very good text on intrusion detection, written by an author who has direct practical experience ... . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. ... the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example ... of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002) "This book is about one of those areas that provides rich opportunities for statisticians ... . The tools for computer intrusion detection are essentially statistical ... . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples ... . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002), From the reviews:TECHNOMETRICS"After reading this book…I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area…This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible."SHORT BOOK REVIEWS"The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance."ISI Short Book Reviews, April 2002"This book is a very good text on intrusion detection, written by an author who has direct practical experience … . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. … the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example … of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002)"This book is about one of those areas that provides rich opportunities for statisticians … . The tools for computer intrusion detection are essentially statistical … . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples … . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1 TCP/IP Networking.- 2 Network Statistics.- 3 Evaluation.- 4 Network Monitoring.- 5 Host Monitoring.- 6 Computer Viruses and Worms.- 7 Trojan Programs and Covert Channels.- Appendix A WellKnown Port Numbers.- Appendix B Trojan Port Numbers.- Appendix C Country Codes.- Appendix D Security Web Sites.- D.1 Introduction.- D.2 General Information Web Sites.- D.3 Security.- D.4 Cyber Crime.- D.5 Software.- D.6 Data.- D.7 Intrusion Detection.- Acronyms.- Author Index.
Synopsis
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection., This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
LC Classification Number
QA276-280

Item description from the seller

About this seller

A Double Take

100% positive feedback650 items sold

Joined Jul 2020
A Double Take is collection of high quality new and pre-loved items. I feature clothing, shoes, and books that I believe you will love!

Detailed Seller Ratings

Average for the last 12 months
Accurate description
5.0
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
--

Seller feedback (227)

All ratings
Positive
Neutral
Negative