Your search for 35754 returns 4329 document(s) |
Perancangan host-based instrusion detection system berbasis artificial neural network, HAL. B.69-B.74 |
Author: Bondan Himawan, Taufiq Hidayat; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimized sampling with clustering approach for large instrusion detection data. hal, 56 |
Author: Nani yasmin, Anto Satriyo Nugroho, Harya Widiputra; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside Internet Security: What hackers don't want you to know.../Jeff Crume |
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan kerangka kerja network security operator center: studi kasus Kementerian Luar Negeri |
Author: Fitri Wijayanti; | Call Number: KA-1457 (Softcopy KA-1445) MAK KA-1097 | Edition: 2021 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining: concepts and techniques |
Author: Han, Jiawei; | Call Number: 006.3 Han d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pembuatan model data mining untuk deteksi fraud pada proses transaksi klaim: studi kasus PT xyz |
Author: Deddy Utomo; | Call Number: KA-1564 (Softcopy KA-1549) MAK KA-1201 | Edition: 2022 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|