**7. References**

50 Security Enhanced Applications for Information Systems

, , outputs of the survey regressions of group g, and *<sup>g</sup> g g s s*

Calculate the rating of each course by applying the personalized equation of Step 3.

Present to the trainee the bundle of courses with the highest rating (Fig. 5).

A number of potential bundles of courses exist based on expert judgment. Apply ratings to

This chapter presents a modelling methodology for developing an e-learning recommender system. The proposed methodology includes the definition of a mathematical user model, as formulated in the context of the shipping industry and its employment and training environment. The implementation of the central component of this recommender system, namely the Training Advisor, is explained as based on discrete choice models and Bayesian theory. In particular, the development of an e-learning recommender system, such as the electronic training advisor proposed will help trainees in choosing the appropriate elearning courses matching their particular characteristics, preferences and needs and based on their expected professional development. The training process as assisted by the proposed training advisor; it takes into account the peculiarities of the seafaring profession,

where:

*y* is Nx1 *X* is NxK

( *y* , *X* ) = the new data

Calculate new coefficients

Calculate Course Ratings

**Step 6.** Recommend

**6. Conclusions** 

 

Update preference equation with new coefficients

**Step 5.** Preference Score of Bundles of Courses

each course of the bundle. Sum-up the ratings.

Fig. 5. E-learning system recommendation

	- http://www.choicestream.com/pdf/ChoiceStream\_TechBrief.pdf

**4**

**Intrusion Detection and Prevention** 

With the rapid development and comprehensive application of network technology, network security problems gradually appear serious. Traditional firewall technologies can't provide sufficient security protection against various attacks and intrusions (Anderson, 1980), while intrusion detection systems (IDS) are faced with compromise between false alarms and false positives (Denning, 1987). In this chapter, we investigate intrusion detection and intrusion prevention in high speed network, introduce related technology and

Information system is an integrated set of components for collecting, storing, processing, and communicating information. Information systems are more than just computer programs. Though information and communications technologies are playing an increasing role in meeting organisations' information needs, an information system is a much more general concept. It refers to the wider systems of people, data and activities, both computerbased and manual, that effectively gather, process, store and disseminate organisations' information. Of course, system security is essential for information system. In another

With the development of Internet, the world economy has been deeply communed together. The nation is just like a huge network computer, and computer network has been the foundation and life vein of a nation's economy. As the entire society increasingly relies on network infrastructures, network security also changes for the worse seriously. It is very difficult for traditional security policies or mechanisms (such as authentication, cryptography and firewall) to prevent network attacks. The whole society needs new

The openness of the system network, the security hole of the network protocol, the defects of the software…Those drawbacks make the network security worse than worse. According to the recently research and report, people found the details and data of network attack

easily. The high occurrence probability makes the problem urgent (Allen et al., 2000).

**1. Introduction** 

our research results.

**1.1 The information system and system security** 

words, security is the most reliable foundation for information system.

**1.2 The actual condition of information system security** 

technology to solve those problems.

 **in High Speed Network** 

Kuo Zhao and Liang Hu

*Jilin University,* 

*China* 

