Sold Out
Book Categories |
1 | Introduction | 1 |
2 | An introduction to intrusion detection | 15 |
3 | The base-rate fallacy and the difficulty of intrusion detection | 31 |
4 | Visualizing intrusions : watching the Webserver | 49 |
5 | Combining a Bayesian classifier with visualization | 69 |
6 | Visualizing the inner workings of a self learning classifier | 89 |
7 | Visualization for intrusion detection - hooking the worm | 111 |
8 | Epilogue | 129 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionUnderstanding Intrusion Detection Through Visualization
X
This Item is in Your InventoryUnderstanding Intrusion Detection Through Visualization
X
You must be logged in to review the productsX
X
X
Add Understanding Intrusion Detection Through Visualization, , Understanding Intrusion Detection Through Visualization to the inventory that you are selling on WonderClubX
X
Add Understanding Intrusion Detection Through Visualization, , Understanding Intrusion Detection Through Visualization to your collection on WonderClub |