Search again

Found: 6  Titles

Order by :    Show:   Per Page
image
A study on the effects of feature sets on intrusion detection system / Yoekleng Kuy.
Author
Yoekleng Kuy.
Published
2017.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / Rajneesh Gupta.
Author
Gupta, Rajneesh.
Published
Birmingham, United Kingdom : Packt Publishing, c2018.
Call Number
Ebook

image
Introduction to cryptography principles and applications / Hans Delfs, Helmut Knebl.
Author
Delfs, Hans.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image
Moving target defense creating asymmetric uncertainty for cyber threats / Sushil Jajodia ... [et al.], editors
Author
Jajodia, Sushil,
Published
New York : Springer, c2011.
Call Number
Ebook

image
Network science and cybersecurity Robinson E. Pino, editor.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image
Preventing good people from doing bad things implementing least privilege / John Mutch, Brian Anderson
Author
Mutch, John
Published
Berkeley, CA : Apress, c2011.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles