1. Introduction.- 2. Host-based Intrusion Detection System.- 3. Network-based Intrusion Detection System.- 4. Data Security and Storage Module in Cloud.- 5. Conclusions and Research Direction.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want