Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Security of data in a network-based computer system has become a major challenge in the world today. With the high increase of network traffic, hackers and malicious users are devising new ways of breaking into computer networks. In other to tackle this problem, an intrusion detection system (IDS) is developed to control access and detect attacks in a computer network. A constructive research methodology is adopted throughout this research to help plan and build a heuristic and theoretical concept on the research topic. A hybridized design methodology (Top-down design approach and object oriented design approach) was equally adopted to help specify the relationship between an object and its class. The development stage was done using some sets of software tools: PHP programming language, HTML and JQuery were used for scripting, MySQL database system and Wamp server which was used to test-run the system during the development process. The system was able to differentiate between: an authorized access from an unauthorized access and also a malicious attack made on the system. The exact location of the hacker is captured on a map immediately the attempt is made. 76 pp. Englisch. Seller Inventory # 9786139986361
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Security of data in a network-based computer system has become a major challenge in the world today. With the high increase of network traffic, hackers and malicious users are devising new ways of breaking into computer networks. In other to tackle this problem, an intrusion detection system (IDS) is developed to control access and detect attacks in a computer network. A constructive research methodology is adopted throughout this research to help plan and build a heuristic and theoretical concept on the research topic. A hybridized design methodology (Top-down design approach and object oriented design approach) was equally adopted to help specify the relationship between an object and its class. The development stage was done using some sets of software tools: PHP programming language, HTML and JQuery were used for scripting, MySQL database system and Wamp server which was used to test-run the system during the development process. The system was able to differentiate between: an authorized access from an unauthorized access and also a malicious attack made on the system. The exact location of the hacker is captured on a map immediately the attempt is made. Seller Inventory # 9786139986361
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Ugochukwu Chibuzor JohnChibuzor John Ugochukwu - Department of Computer Science, Rivers State University, Port Harcourt, Nigeria.Security of data in a network-based computer system has become a major challenge in the world today. Seller Inventory # 300583698
Quantity: Over 20 available