Limit Search Results
Language
Format
11 Results Found Subscribe to search results
00000000000MAIN
Print
1. 
Cover image for Information security risk assessment toolkit :   practical assessments through data collection and data analysis
2. 
Cover image for Role mining in business : taming role-based access control administration
3. 
Cover image for Data mining and machine learning in cybersecurity
6. 
Cover image for Data warehousing and data mining techniques for cyber security
9. 
Cover image for Investigative data mining for security and criminal detection