Enhancing Computer Security with Smart Technology

V. Rao Vemuri, Enhancing Computer Security with Smart Technology
AUERBACH | ISBN: 0849330459 | November 21, 2005 | 288 pages | PDF | 1.8 Mb
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
Thanks, vorobej!!


-= Download link @ Rapidshare =-


No mirrors please ...

[Fast Download] Enhancing Computer Security with Smart Technology


Related eBooks:
Handbook of Mobile Data Privacy
Securing Applications on the Cloud
Gaining Access and Covering Your Tracks with Kali Linux
Internet of Things Security : Fundamentals, Techniques and Applications
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementatio
Timing Channels in Cryptography
Amazon Hacks: 100 Industrial-Strength Tips & Tools
J. Evans, P. Grimshaw, D. Phillips - Equal Subjects, Unequal Rights: Indigenous People in British Se
DEWALT Security, Sound, & Video Professional Reference
Cybersecurity Test and Evaluation Guidebook 2.0
Router Security Strategies: Securing IP Network Traffic Planes
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.