Search again

Found: 17  Titles

Order by :    Show:   Per Page
image
A study on the effects of feature sets on intrusion detection system / Yoekleng Kuy.
Author
Yoekleng Kuy.
Published
2017.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image

image
Cloud security automation Get to grips with automating your cloud security on AWS and OpenStack.
Author
Priyam, Prashant.
Published
Birmingham : Packt Publishing, c2018.
Call Number
Ebook

image
Enabling secure and privacy preserving communications in smart grids Hongwei Li.
Author
Li, Hongwei.
Published
Cham : Springer, 2014.
Call Number
Ebook

image
Formal correctness of security protocols Giampaolo Bella
Author
Bella, Giampaolo.
Published
Berlin : Springer, c2007
Call Number
Ebook

image
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / Rajneesh Gupta.
Author
Gupta, Rajneesh.
Published
Birmingham, United Kingdom : Packt Publishing, c2018.
Call Number
Ebook

image
Hands-on security in DevOps ensure continuous security, deployment, and delivery with DevSecOps / Tony Hsu.
Author
Hsu, Tony.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image
Introduction to cryptography principles and applications / Hans Delfs, Helmut Knebl.
Author
Delfs, Hans.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image
Malware detection edited by Mihai Christodorescu ... [et al.]
Published
New York : Springer, 2007.
Call Number
Ebook

image
Mobile and wireless network security and privacy edited by S. Kami Makki ... [et al.]
Author
Makki, S. Kami,
Published
New York : Springer, c2007
Call Number
Ebook

image
Moving target defense creating asymmetric uncertainty for cyber threats / Sushil Jajodia ... [et al.], editors
Author
Jajodia, Sushil,
Published
New York : Springer, c2011.
Call Number
Ebook

image
Network science and cybersecurity Robinson E. Pino, editor.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image
Preventing good people from doing bad things implementing least privilege / John Mutch, Brian Anderson
Author
Mutch, John
Published
Berkeley, CA : Apress, c2011.
Call Number
Ebook

image
Primer on client-side web security Philippe De Ryck [and three others].
Published
Cham : Springer, c2014.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles