Detection and intelligent systems for homeland security. /
Sábháilte in:
Rannpháirtithe: | Voeller, John G. |
---|---|
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Hoboken, New Jersey :
John Wiley & Sons,
2014.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Homeland security techniques and technologies
de réir: Mena, Jesus
Foilsithe / Cruthaithe: (2004)
de réir: Mena, Jesus
Foilsithe / Cruthaithe: (2004)
Knowledge mining using intelligent agents
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Security Informatics
de réir: Yang, Christopher C.
Foilsithe / Cruthaithe: (2010)
de réir: Yang, Christopher C.
Foilsithe / Cruthaithe: (2010)
Advances in artificial intelligence for privacy protection and security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Securing information and communications systems principles, technologies, and applications /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Discovering business intelligence using MicroStrategy 9 /
de réir: Enriquez, Nelson
Foilsithe / Cruthaithe: (2013)
de réir: Enriquez, Nelson
Foilsithe / Cruthaithe: (2013)
Mastering Splunk : optimize your machine-generated data effectively by developing advanced analytics with Splunk /
de réir: Miller, James
Foilsithe / Cruthaithe: (2014)
de réir: Miller, James
Foilsithe / Cruthaithe: (2014)
Data mining concepts and techniques /
de réir: Han, Jiawei
Foilsithe / Cruthaithe: (2006)
de réir: Han, Jiawei
Foilsithe / Cruthaithe: (2006)
Data mining and management
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Distributed systems security issues, processes, and solutions /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Information security policy, processes, and practices /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Building the Infrastructure for Cloud Security A Solutions view /
de réir: Yeluri, Raghu, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Yeluri, Raghu, et al.
Foilsithe / Cruthaithe: (2014)
Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide /
de réir: Booth, Jody
Foilsithe / Cruthaithe: (2023)
de réir: Booth, Jody
Foilsithe / Cruthaithe: (2023)
Implementing database security and auditing
de réir: Ben-Natan, Ron
Foilsithe / Cruthaithe: (2005)
de réir: Ben-Natan, Ron
Foilsithe / Cruthaithe: (2005)
Comptia Security+ 2008 in depth
de réir: Ciampa, Mark D.
Foilsithe / Cruthaithe: (2009)
de réir: Ciampa, Mark D.
Foilsithe / Cruthaithe: (2009)
Information assurance and computer security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Intelligent watermarking techniques
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Developing analytic talent : becoming a data scientist /
de réir: Granville, Vincent
Foilsithe / Cruthaithe: (2014)
de réir: Granville, Vincent
Foilsithe / Cruthaithe: (2014)
Infinispan data grid platform
de réir: Marchioni, Francesco
Foilsithe / Cruthaithe: (2012)
de réir: Marchioni, Francesco
Foilsithe / Cruthaithe: (2012)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
Data preparation for data mining using SAS
de réir: Refaat, Mamdouh
Foilsithe / Cruthaithe: (2007)
de réir: Refaat, Mamdouh
Foilsithe / Cruthaithe: (2007)
Oracle Information integration, migration, and consolidation the definitive guide to information integration and migration in a heterogeneous world : use Oracle technologies and best practices to manage, maintain, migrate, and mobilize data /
de réir: Williamson, Jason
Foilsithe / Cruthaithe: (2011)
de réir: Williamson, Jason
Foilsithe / Cruthaithe: (2011)
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
Security in distributed and networking systems
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Black hat physical device security exploiting hardware and software /
de réir: Miller, Drew
Foilsithe / Cruthaithe: (2005)
de réir: Miller, Drew
Foilsithe / Cruthaithe: (2005)
Security Informatics
Information security management principles
de réir: Alexander, David
Foilsithe / Cruthaithe: (2013)
de réir: Alexander, David
Foilsithe / Cruthaithe: (2013)
Real-time analytics : techniques to analyze and visualize streaming data /
de réir: Ellis, Byron
Foilsithe / Cruthaithe: (2014)
de réir: Ellis, Byron
Foilsithe / Cruthaithe: (2014)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Data mining for dummies /
de réir: Brown, Meta S.
Foilsithe / Cruthaithe: (2014)
de réir: Brown, Meta S.
Foilsithe / Cruthaithe: (2014)
Discovering knowledge in data an introduction to data mining /
de réir: Larose, Daniel T.
Foilsithe / Cruthaithe: (2005)
de réir: Larose, Daniel T.
Foilsithe / Cruthaithe: (2005)
Active mining new directions of data mining /
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Data mining concepts and techniques /
de réir: Han, Jiawei
Foilsithe / Cruthaithe: (2012)
de réir: Han, Jiawei
Foilsithe / Cruthaithe: (2012)
Instant Weka how-to
de réir: Kaluža, Boštjan
Foilsithe / Cruthaithe: (2013)
de réir: Kaluža, Boštjan
Foilsithe / Cruthaithe: (2013)
Practical text mining and statistical analysis for non-structured text data applications
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Data analysis and data mining an introduction /
de réir: Azzalini, Adelchi
Foilsithe / Cruthaithe: (2012)
de réir: Azzalini, Adelchi
Foilsithe / Cruthaithe: (2012)
Data mining practical machine learning tools and techniques /
de réir: Witten, I. H. (Ian H.)
Foilsithe / Cruthaithe: (2011)
de réir: Witten, I. H. (Ian H.)
Foilsithe / Cruthaithe: (2011)
Spectral feature selection for data mining /
de réir: Zhao, Zheng (Zheng Alan), et al.
Foilsithe / Cruthaithe: (2012)
de réir: Zhao, Zheng (Zheng Alan), et al.
Foilsithe / Cruthaithe: (2012)
Java data mining strategy, standard, and practice :a practical guide for architecture, design, and implementation /
de réir: Hornick, Mark F.
Foilsithe / Cruthaithe: (2007)
de réir: Hornick, Mark F.
Foilsithe / Cruthaithe: (2007)
Míreanna comhchosúla
-
Homeland security techniques and technologies
de réir: Mena, Jesus
Foilsithe / Cruthaithe: (2004) -
Knowledge mining using intelligent agents
Foilsithe / Cruthaithe: (2011) -
Security Informatics
de réir: Yang, Christopher C.
Foilsithe / Cruthaithe: (2010) -
Advances in artificial intelligence for privacy protection and security
Foilsithe / Cruthaithe: (2010) -
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
Foilsithe / Cruthaithe: (2010)