 |
|
 Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,... |  |  Securing the Cloud: Cloud Computer Security Techniques and Tactics
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services... |  |  The Developer's Code
This is a book for developers of all kinds. However, it has
little to do with code. It doesn’t matter if you program in C#
or Ruby or Python or PHP or Java or JavaScript or Action-
Script. It doesn’t matter whether you’re working on
databases, writing server-side code, or scripting the ... |
|
|
 Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael
Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web
reports, (before the term "Bl" came to embody what at the time we thought was an incredibly
innovative way to display call center metrics for managing... |  |  |  |  |
|
|
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 |