free tracker

Analyzing Computer Security

Pub Date : 2012 | Author : Charles P. Pfleeger | Publisher : Prentice Hall Professional

ISBN 10 : 9780132789462
ISBN 13 : 0132789469

A fresh new approach to computer security by the authors of the 20-year best-selling classic Security in Computing. • •Introduces computer security the way today's practitioner..



Analyzing Computer Security

Pub Date : 2012 | Author : Charles P. Pfleeger | Publisher :

ISBN 10 : 0132839407
ISBN 13 : 9780132839402

The authors teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, ..


Applications Of Data Mining In Computer Security

Pub Date : 2012-12-06 | Author : Daniel Barbará | Publisher : Springer Science & Business Media

ISBN 10 : 9781461509530
ISBN 13 : 146150953X

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial t..


Data Driven Security

Pub Date : 2014-01-24 | Author : Jay Jacobs | Publisher : John Wiley & Sons

ISBN 10 : 9781118793824
ISBN 13 : 111879382X

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent securi..


Inside Cyber Warfare

Pub Date : 2011-12-09 | Author : Jeffrey Carr | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781449325459
ISBN 13 : 1449325459

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this glo..


Data Analysis For Network Cyber Security

Pub Date : 2014-02-28 | Author : Niall Adams | Publisher : World Scientific

ISBN 10 : 9781783263769
ISBN 13 : 1783263768

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack..