by
Vagata, Pamela, on-screen presenter.
Format:
Electronic Resources
Excerpt:
Fraud detection without feature engineering / Vagata, Pamela, on-screen presenter.
by
Alder, Raven.
Format:
Electronic Resources
Excerpt:
Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security
View Other Search Results
by
Carbone, Fernando.
Format:
Electronic Resources
Excerpt:
item -- Creating forensic images -- Mounting the image -- The Capture Memory feature -- Obtaining the
by
Littlejohn Shinder, Debra.
Format:
Electronic Resources
Excerpt:
Server 2004 Feature Set -- Stalking the Competition: How ISA 2004 Stacks Up -- ISA 2004 Network Concepts
by
Redbooks, IBM.
Format:
Electronic Resources
Excerpt:
Battery Feature -- 2.14 Power and cooling -- 2.14.1 Cooling -- Chapter 3. Key functional elements -- 3.1
by
Contos, Brian T.
Format:
Electronic Resources
Excerpt:
-- Chapter 3 Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements
by
Li, Qing.
Format:
Electronic Resources
Excerpt:
Classification Technique -- Feature Selection -- Supervised Machine Learning Algorithms -- Naïve Bayes Method
by
Contos, Brian T.
Format:
Electronic Resources
Excerpt:
Feature Requirements -- o Event Collection -- o Normalization -- o Categorization -- o Asset Information
by
Redbooks, IBM.
Format:
Electronic Resources
Excerpt:
Feature (CCF) -- 7.1.2 PCI Cryptographic Coprocessor (PCICC) -- 7.1.3 PCI Cryptographic Accelerator (PCICA
by
Ye, Nong.
Format:
Electronic Resources
Excerpt:
Data Models for the Mean Feature -- 16.3 Statistical Data Models for the Distribution Feature -- 16.4
by
Lopez, Javier.
Format:
Electronic Resources
Excerpt:
that feature the latest biometric techniques, followed by authorization and access controls including
by
Rittinghouse, PhD, CISM, John.
Format:
Electronic Resources
Excerpt:
actions -- 11.9 Computer forensic tools -- 11. 10 Special feature: NTI President Michael R.Anderson on
Limit Search Results
Narrowed by: