header image

Your search returned 3 results.

1.
Application of Data Mining in Computer Security

by Barbara D | Jajodia S.

Edition: - Springer India Pvt. Ltd. 2009Availability: Items available for loan: Central Library, KARE, Krishnankoil Campus (1). Location(s): General Stack Call number: -.
2.
Handbook of Database Security Applications and Trends

by Gertz M | Jajodia S.

Edition: - Springer India Pvt. Ltd. 2008Availability: Items available for loan: Central Library, KARE, Krishnankoil Campus (1). Location(s): Reference (Not for Circulation) Call number: 681.3.02/GER.
3.
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

by Ning P | Jajodia S | Wang X S.

Kluwer Academic Publishers 2004Availability: Items available for loan: Central Library, KARE, Krishnankoil Campus (1). Location(s): Reference (Not for Circulation) Call number: 681.324.02(083.73) P4.
Use your Register Number/Library Membership Number as your Login ID and Date of Birth (dd/mm/yyyy) as password to log in to your account

Implemented and Maintained by Central Library, KARE -[Visitors]- free website counter