Intrusion Analysis

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century (repost)

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century By Ryan Trost
2009 | 480 Pages | ISBN: 0321591801 | EPUB | 14 MB
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century (Repost)

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century By Ryan Trost
2009 | 480 Pages | ISBN: 0321591801 | EPUB + PDF | 14 MB + 12 MB
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century By Ryan Trost
Publisher: Add..ison-Wes..ley Professional 2009 | 480 Pages | ISBN: 0321591801 | EPUB + PDF | 14 MB + 12 MB

Pentester Academy - Log File Analysis  eBooks & eLearning

Posted by FenixN at June 20, 2016
Pentester Academy - Log File Analysis

Pentester Academy - Log File Analysis
HDRips | MP4/AVC, ~264 kb/s | 1446x762 | Duration: 00:40:40 | English: AAC, 128 kb/s (2 ch) | + Work Files | 16,9 GB
Genre: Development / Programming

This course teaches students how to analyse logs effectively using tools already available to you. The students will be taught how to analyse logs using Python, Powershell and Bash. Using real world examples, you will see how suspicious activity can be inferred from the logs by looking at various parameters.
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285 by Todd Lammle
English | 13 Oct. 2015 | ASIN: B0182XBBM2 | 432 Pages | AZW3 | 17.51 MB

Outlier Analysis [repost]  eBooks & eLearning

Posted by hill0 at March 25, 2017
Outlier Analysis [repost]

Outlier Analysis by Charu C. Aggarwal
English | 11 Jan. 2013 | ISBN: 1461463955 | 464 Pages | PDF (True) | 3.71 MB

With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field.

Intrusion Detection in Wireless Ad-Hoc Networks [Repost]  eBooks & eLearning

Posted by ChrisRedfield at Feb. 6, 2017
Intrusion Detection in Wireless Ad-Hoc Networks [Repost]

Nabendu Chaki, Rituparna Chaki - Intrusion Detection in Wireless Ad-Hoc Networks
Published: 2014-02-06 | ISBN: 1466515651 | PDF | 258 pages | 5.28 MB

Network Security Through Data Analysis [Repost]  eBooks & eLearning

Posted by tanas.olesya at Dec. 8, 2016
Network Security Through Data Analysis [Repost]

Network Security Through Data Analysis: Building Situational Awareness by Michael S Collins
English | 23 Feb. 2014 | ISBN: 1449357903 | 348 Pages | PDF | 13 MB

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks.

Intrusion (2015)  Video

Posted by HDPRo at Nov. 11, 2016
Intrusion (2015)

Intrusion (2015)
HDRiP | MKV | 720x408 | AVC@948 kb/s | Enhlish | AC3@384 kb/s | 2 channels | 1 h 13 min | 700 MB
Genre: Thriller

Holly Jensen leads an overly dramatic life. After friend Kali talks Holly into a harmless game, things become deadly.

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint  eBooks & eLearning

Posted by fdts at Sept. 25, 2016
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
by David J. Marchette
English | 2001 | ISBN: 1441929371 | 333 pages | PDF | 9.35 MB