A Proposed Intrusion Detection System For Encrypted Computer Networks / Nesreen Kamel Abu Seree Ahmed ; Supervised Sanaa El Ola Hanafi Ahmed , Nabil Hamdy Shaker
Language: Eng Publication details: Cairo : Nesreen Kamel Abu Seree Ahmed , 2006Description: 131P : ill ; 30cmOther title:- نظام مقترح لكشف اختراق شبكات الحاسب المشفرة [Added title page title]
- Issued also as CD
| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Thesis
|
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.M.Sc.2006.Ne.P. (Browse shelf(Opens below)) | Not for loan | 01010110045880000 | |
CD - Rom
|
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.M.Sc.2006.Ne.P. (Browse shelf(Opens below)) | Not for loan | 01020110045880000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
| No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
| Cai01.20.01.M.Sc.2006.Ho.I. Improving Change Detection Capability Using Fuzzy Logic for Remote Sensing Images / | Cai01.20.01.M.Sc.2006.Ho.I. Improving Change Detection Capability Using Fuzzy Logic for Remote Sensing Images / | Cai01.20.01.M.Sc.2006.Ne.P. A Proposed Intrusion Detection System For Encrypted Computer Networks / | Cai01.20.01.M.Sc.2006.Ne.P. A Proposed Intrusion Detection System For Encrypted Computer Networks / | Cai01.20.01.M.Sc.2006.Os.H Hidden markov models based speech synthesis / | Cai01.20.01.M.Sc.2006.Os.H Hidden markov models based speech synthesis / | Cai01.20.01.M.Sc.2006.Re.P. A proposed security system for mobile networks / |
Thesis (M.Sc.) - Cairo University - Faculty Of Computers and information - Department Of Information Technology
A computer system intrusion is seen as any set of actions that attempt to compromise the integrity , confidentiality , or availability of a resourceThe introduction of networks and the Internet as a medium for wide scale electronic communication caused great concern about the protection of sensitive informationAlthough prevention methods such as access control , authentication , and encryption attempt to prevent intruders , these can fail , and as a second line of defense , intrusion detection has been introducedIntrusion detection systems are responsible for monitoring and analyzing host or network activity to detect intrusions in order to protect unauthorized access or manipulation
Issued also as CD
There are no comments on this title.