Condizione: New. pp. 228.
Da: Majestic Books, Hounslow, Regno Unito
EUR 35,70
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 228 Illus.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 36,37
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 228.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 148,75
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 148,74
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 198,13
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 188,60
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Da: moluna, Greven, Germania
EUR 163,39
Quantità: Più di 20 disponibili
Aggiungi al carrelloGebunden. Condizione: New. No similar work existsVery hot topicDiverse and current view of areaAlso provides introductory background chapter for readers who are unfamiliar with inductive approachesDesigned to help such readers understand the contributed.
Condizione: As New. Unread book in perfect condition.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 227,70
Quantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware - 'Machine Learning and Data Mining for Computer Security' provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.