Limit Search Results
Format
26 Results Found Subscribe to search results
000000000000MAIN
Print
1. 
Cover image for Intrusion detection : a machine learning approach
2. 
Cover image for Data mining and machine learning in cybersecurity
3. 
Cover image for Machine learning forensics for law enforcement, security, and intelligence
4. 
Cover image for Machine learning and data mining for computer security :  methods and applications
5. 
Cover image for Security + guide to network security fundamentals
6. 
Cover image for Managing risk in information systems
7. 
Cover image for Security policies and implementation issues
8. 
Cover image for Security strategies in Linux platforms and applications
9. 
Cover image for Cybersecurity Analytics
10. 
Cover image for CYBER INFLUENCE AND COGNITIVE THREATS
11. 
Cover image for GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS
12. 
Cover image for Guide to network defense and countermeasures