Hand, Short Book Reviews, Vol.Guide is up-to-date. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. The book provides an excellent introduction to the area. The book effectively provides the necessary background material for this intensely jargon-strewn area. The tools for computer intrusion detection are essentially statistical …. "This book is about one of those areas that provides rich opportunities for statisticians …. It is an example … of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. … the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. "This book is a very good text on intrusion detection, written by an author who has direct practical experience …. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance." "The book provides an excellent introduction to the area. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area…This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. "After reading this book…I believe that many readers would benefit from the skillful joint development of problem context and statistical application. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. The first task was to find a book from which to teach. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. That course was the genesis of this book. In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |