| 000 | 019290000a22003370004500 | ||
|---|---|---|---|
| 003 | EG-GICUC | ||
| 005 | 20250223030529.0 | ||
| 008 | 060917s2006 ua a f m 000 0 eng d | ||
| 040 |
_aEG-GICUC _beng _cEG-GICUC |
||
| 041 | 0 | _aEng | |
| 049 | _aDeposite | ||
| 097 | _aM.Sc | ||
| 099 | _aCai01.20.01.M.Sc.2006.Ne.P. | ||
| 100 | 0 | _aNesreen Kamel Abu Seree Ahmed | |
| 245 | 1 | 2 |
_aA Proposed Intrusion Detection System For Encrypted Computer Networks / _cNesreen Kamel Abu Seree Ahmed ; Supervised Sanaa El Ola Hanafi Ahmed , Nabil Hamdy Shaker |
| 246 | 1 | 5 | _aنظام مقترح لكشف اختراق شبكات الحاسب المشفرة |
| 260 |
_aCairo : _bNesreen Kamel Abu Seree Ahmed , _c2006 |
||
| 300 |
_a131P : _bill ; _c30cm |
||
| 502 | _aThesis (M.Sc.) - Cairo University - Faculty Of Computers and information - Department Of Information Technology | ||
| 520 | _aA computer system intrusion is seen as any set of actions that attempt to compromise the integrity , confidentiality , or availability of a resourceThe introduction of networks and the Internet as a medium for wide scale electronic communication caused great concern about the protection of sensitive informationAlthough prevention methods such as access control , authentication , and encryption attempt to prevent intruders , these can fail , and as a second line of defense , intrusion detection has been introducedIntrusion detection systems are responsible for monitoring and analyzing host or network activity to detect intrusions in order to protect unauthorized access or manipulation | ||
| 530 | _aIssued also as CD | ||
| 653 | 4 | _aIntrusion Detection | |
| 653 | 4 | _aNetworks | |
| 653 | 4 | _aNIST | |
| 700 | 0 |
_aNabil Hamdy Shaker , _eSupervisor |
|
| 700 | 0 |
_aSanaa El Ola Hanafi Ahmed , _eSupervisor |
|
| 856 | _uhttp://172.23.153.220/th.pdf | ||
| 905 |
_aAmira _eCataloger |
||
| 905 |
_aMustafa _eRevisor |
||
| 942 |
_2ddc _cTH |
||
| 999 |
_c36667 _d36667 |
||