In the mold of effective Java, this book reveals powerful new insights for creating more memory-efficient, scalable Java software.
Edith Schonberg Knihy



Written for IT professionals and security analysts, this book provides an in-depth analysis of various monitoring algorithms that are used to detect anomalous access to computer systems. The authors compare and contrast different approaches, providing detailed case studies and practical advice on how to implement effective monitoring strategies.