Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Search
The utilization of trend analy...
Holdings
Cite this
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
Bibliographic Details
Main Authors:
Martin, Botha
,
Rossouw, von Solms
Format:
text
Language:
eng
Published:
Emerald
2001
Subjects:
Computer security,Hacking,Fuzzy logics
Holdings
Description
Similar Items
Staff View
Similar Items
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model
by: Martin, Botha, et al.
Published: (2002)
Networks security measures using neuro‐fuzzy agents
by: Nasser S., Abouzakhar, et al.
Published: (2003)
Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share
by: Brad, Eden
Published: (2002)
Internet‐based security incidents and the potential for false alarms
by: M.P., Evans, et al.
Published: (2000)
Security analysers: administrator assistants or hacker helpers?
by: Steven M., Furnell, et al.
Published: (2001)
×
Loading...