0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.): Marcus A. Maloof Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.)
Marcus A. Maloof
R3,902 Discovery Miles 39 020 Ships in 18 - 22 working days

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.

This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.

Machine Learning and Data Mining for Computer Security - Methods and Applications (Paperback, 2006): Marcus A. Maloof Machine Learning and Data Mining for Computer Security - Methods and Applications (Paperback, 2006)
Marcus A. Maloof
R3,745 Discovery Miles 37 450 Ships in 18 - 22 working days

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.

This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prismacolor Premier Colour Pencils…
R1,449 R1,176 Discovery Miles 11 760
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R724 Discovery Miles 7 240
Sunbeam SSI-018BA Steam Iron…
R263 Discovery Miles 2 630
Marry Me
Jennifer Lopez, Owen Wilson, … DVD R245 Discovery Miles 2 450
Multistage Pet Food (20kg) - JOCK
 (2)
R595 Discovery Miles 5 950
Adidas Hybrid 50 Boxing Gloves (Black…
R532 R444 Discovery Miles 4 440
Dog
Channing Tatum DVD R264 Discovery Miles 2 640
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Elegant Choker Necklace
R570 R399 Discovery Miles 3 990
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990

 

Partners