LIBROS DEL AUTOR: mohssen mohammed

5 resultados para LIBROS DEL AUTOR: mohssen mohammed

mohssen mohammed Eliminar filtro Quitar filtros
  • Honeypots and Routers
    Habib-ur Rehman / Mohssen Mohammed
    An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as well as the skills to deploy the best honeypot an ...
    Disponible

    80,25 €

  • Machine Learning
    Eihab Bashier Mohammed Bashier / Mohssen Mohammed / Muhammad Badruddin Khan
    Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and desc ...
    Disponible

    85,53 €

  • Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
    Al-Sakib Khan Pathan / Mohssen Mohammed
    Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature...
    Disponible

    110,69 €

  • Machine Learning
    Eihab Bashier Mohammed Bashier / Mohssen Mohammed / Muhammad Badruddin Khan
    Machine learning, one of the top emerging sciences, has an extremely broad range of applications. ...
    Disponible

    161,27 €

  • Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
    Al-Sakib Khan Pathan / Mohssen Mohammed
    Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature...
    Disponible

    160,75 €