Electronic Books

Total Books: 1 - 3 /3
Data Warehousing and Data Mining Techniques for Cyber Security

It provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, ...

Lee mas
Data Warehousing and Data Mining Techniques for Cyber Security

It provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, ...

Lee mas
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Lee mas
Total Books: 1 - 3 /3