Detection and intelligent systems for homeland security. /
Zapisane w:
Kolejni autorzy: | Voeller, John G. |
---|---|
Format: | Elektroniczne E-book |
Język: | angielski |
Wydane: |
Hoboken, New Jersey :
John Wiley & Sons,
2014.
|
Hasła przedmiotowe: | |
Dostęp online: | An electronic book accessible through the World Wide Web; click to view |
Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
Podobne zapisy
Homeland security techniques and technologies
od: Mena, Jesus
Wydane: (2004)
od: Mena, Jesus
Wydane: (2004)
Knowledge mining using intelligent agents
Wydane: (2011)
Wydane: (2011)
Security Informatics
od: Yang, Christopher C.
Wydane: (2010)
od: Yang, Christopher C.
Wydane: (2010)
Advances in artificial intelligence for privacy protection and security
Wydane: (2010)
Wydane: (2010)
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
Wydane: (2010)
Wydane: (2010)
Securing information and communications systems principles, technologies, and applications /
Wydane: (2008)
Wydane: (2008)
Discovering business intelligence using MicroStrategy 9 /
od: Enriquez, Nelson
Wydane: (2013)
od: Enriquez, Nelson
Wydane: (2013)
Mastering Splunk : optimize your machine-generated data effectively by developing advanced analytics with Splunk /
od: Miller, James
Wydane: (2014)
od: Miller, James
Wydane: (2014)
Data mining and management
Wydane: (2010)
Wydane: (2010)
Data mining concepts and techniques /
od: Han, Jiawei
Wydane: (2006)
od: Han, Jiawei
Wydane: (2006)
Distributed systems security issues, processes, and solutions /
Wydane: (2009)
Wydane: (2009)
Information security policy, processes, and practices /
Wydane: (2008)
Wydane: (2008)
Building the Infrastructure for Cloud Security A Solutions view /
od: Yeluri, Raghu, i wsp.
Wydane: (2014)
od: Yeluri, Raghu, i wsp.
Wydane: (2014)
Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide /
od: Booth, Jody
Wydane: (2023)
od: Booth, Jody
Wydane: (2023)
Implementing database security and auditing
od: Ben-Natan, Ron
Wydane: (2005)
od: Ben-Natan, Ron
Wydane: (2005)
Information assurance and computer security
Wydane: (2006)
Wydane: (2006)
Comptia Security+ 2008 in depth
od: Ciampa, Mark D.
Wydane: (2009)
od: Ciampa, Mark D.
Wydane: (2009)
Intelligent watermarking techniques
Wydane: (2004)
Wydane: (2004)
Developing analytic talent : becoming a data scientist /
od: Granville, Vincent
Wydane: (2014)
od: Granville, Vincent
Wydane: (2014)
Infinispan data grid platform
od: Marchioni, Francesco
Wydane: (2012)
od: Marchioni, Francesco
Wydane: (2012)
Data preparation for data mining using SAS
od: Refaat, Mamdouh
Wydane: (2007)
od: Refaat, Mamdouh
Wydane: (2007)
Oracle Information integration, migration, and consolidation the definitive guide to information integration and migration in a heterogeneous world : use Oracle technologies and best practices to manage, maintain, migrate, and mobilize data /
od: Williamson, Jason
Wydane: (2011)
od: Williamson, Jason
Wydane: (2011)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
od: Li, Qing, i wsp.
Wydane: (2015)
od: Li, Qing, i wsp.
Wydane: (2015)
Security architect : careers in information security /
od: Collins, Jon
Wydane: (2014)
od: Collins, Jon
Wydane: (2014)
Security in distributed and networking systems
Wydane: (2007)
Wydane: (2007)
Black hat physical device security exploiting hardware and software /
od: Miller, Drew
Wydane: (2005)
od: Miller, Drew
Wydane: (2005)
Security Informatics
Real-time analytics : techniques to analyze and visualize streaming data /
od: Ellis, Byron
Wydane: (2014)
od: Ellis, Byron
Wydane: (2014)
Information security management principles
od: Alexander, David
Wydane: (2013)
od: Alexander, David
Wydane: (2013)
Data mining for dummies /
od: Brown, Meta S.
Wydane: (2014)
od: Brown, Meta S.
Wydane: (2014)
Discovering knowledge in data an introduction to data mining /
od: Larose, Daniel T.
Wydane: (2005)
od: Larose, Daniel T.
Wydane: (2005)
Active mining new directions of data mining /
Wydane: (2002)
Wydane: (2002)
Practical text mining and statistical analysis for non-structured text data applications
Wydane: (2012)
Wydane: (2012)
Data mining concepts and techniques /
od: Han, Jiawei
Wydane: (2012)
od: Han, Jiawei
Wydane: (2012)
Data mining practical machine learning tools and techniques /
od: Witten, I. H. (Ian H.)
Wydane: (2011)
od: Witten, I. H. (Ian H.)
Wydane: (2011)
Data analysis and data mining an introduction /
od: Azzalini, Adelchi
Wydane: (2012)
od: Azzalini, Adelchi
Wydane: (2012)
Instant Weka how-to
od: Kaluža, Boštjan
Wydane: (2013)
od: Kaluža, Boštjan
Wydane: (2013)
Spectral feature selection for data mining /
od: Zhao, Zheng (Zheng Alan), i wsp.
Wydane: (2012)
od: Zhao, Zheng (Zheng Alan), i wsp.
Wydane: (2012)
Java data mining strategy, standard, and practice :a practical guide for architecture, design, and implementation /
od: Hornick, Mark F.
Wydane: (2007)
od: Hornick, Mark F.
Wydane: (2007)
Process, data and classifier models for accessible supervised classification problem solving /
od: De Bruyne, Steven
Wydane: (2010)
od: De Bruyne, Steven
Wydane: (2010)
Podobne zapisy
-
Homeland security techniques and technologies
od: Mena, Jesus
Wydane: (2004) -
Knowledge mining using intelligent agents
Wydane: (2011) -
Security Informatics
od: Yang, Christopher C.
Wydane: (2010) -
Advances in artificial intelligence for privacy protection and security
Wydane: (2010) -
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
Wydane: (2010)