Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks.
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from Septembe
This title teaches readers how to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated att