Artificial immune system: Applications in computer security
Material type:
TextLanguage: English Publication details: New Jersey Wiley 2016Description: xxvii,174p. ill. cmISBN: - 9781119076285 (Hbk)
- D65,8(B):(894), Q6
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B):(894) Q6 (Browse shelf(Opens below)) | Available | SL1600694 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| D65,8(B):(894) Q6 Information hiding | D65,8(B):(894) Q6 Cyber security for industrial control systems from the viewpoint of close-loop | D65,8(B):(894) Q6 How to measure anything in cybersecurity risk | D65,8(B):(894) Q6 Artificial immune system: Applications in computer security | D65,8(B):(894) Q6 Cyber-security of SCADA and other industrial control systems | D65,8(B):(894) Q7 History of cyber security attacks: 1980 to present | D65,8(B):(894) Q7 Introduction to certificateless cryptography |
References 172p.; Index 173-174p.
There are no comments on this title.
Log in to your account to post a comment.
