Written for IT professionals and security analysts, this book provides an in-depth analysis of various monitoring algorithms that are used to detect anomalous access to computer systems. The authors compare and contrast different approaches, providing detailed case studies and practical advice on how to implement effective monitoring strategies. This work has been selected by scholars as being culturally important, and is part of the knowledge...