Artificial immune system: Applications in computer security Tan Ying
Material type:
- 9781119076285 (Hbk)
- D65,8(B):(894), Q6
Item type | Current library | Home library | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Central Science Library | Central Science Library | D65,8(B):(894) Q6 (Browse shelf(Opens below)) | Available | SL1600694 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
D65,8(B):(894) Q6 Information hiding | D65,8(B):(894) Q6 Cyber security for industrial control systems from the viewpoint of close-loop | D65,8(B):(894) Q6 How to measure anything in cybersecurity risk | D65,8(B):(894) Q6 Artificial immune system: Applications in computer security | D65,8(B):(894) Q6 Cyber-security of SCADA and other industrial control systems | D65,8(B):(894) Q7 History of cyber security attacks: 1980 to present | D65,8(B):(894) Q7 Introduction to certificateless cryptography |
References 172p.; Index 173-174p.
There are no comments on this title.
Log in to your account to post a comment.