• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱ پاسخ غیر تکراری از ۱ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

1. Understanding Intrusion Detection Through Visualization

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Stefan Axelsson, David Sands.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer Communication Networks.,Data encryption (Computer science),Data structures (Computer science)

Classification :
TK5105
.
59
B978
2006
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival