Buch, Englisch, 159 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 436 g
Buch, Englisch, 159 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 436 g
Reihe: Advances in Information Security
ISBN: 978-0-387-26409-7
Verlag: Springer US
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single computers, computer networks, wireless networks, databases, or authentication compromises. This book describes data warehousing and data mining techniques that can be used to detect attacks. It is designed to be a useful handbook for practitioners and researchers in industry, and is also suitable as a text for advanced-level students in computer science.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Grafikprogrammierung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Warehouse
Weitere Infos & Material
An Overview of Data Warehouse, OLAP and Data Mining Technology.- Network and System Security.- Intrusion Detection Systems.- Data Mining for Intrusion Detection.- Data Modeling and Data Warehousing Techniques to Improve Intrusion Detection.- Minds: Architecture & Design.- Discovering Novel Attack Strategies from Infosec Alerts.




